Skip to content

Latest commit

 

History

History
51 lines (22 loc) · 1.77 KB

inspect_results.md

File metadata and controls

51 lines (22 loc) · 1.77 KB

Inspect results

image-20211011151908487

After running SyzScope for the first time, it generated a main work folder under the project folder. Please check the detailed structure of main work folder on Workzone Structure.

The workflow of SyzScope shown above. Each component has their own output folder.

Fuzzing's output folder is output

Static analysis's output folder is static-xxx

Symbolic execution output folder is sym-xxx

If a bug has been turned into high-risk by either fuzzing or symbolic execution, it will be moved to succeed folder under main work folder.

Normally, we only need to check the output and sym-xxx under succeed folder. By inspecting repro.report, we can find if a bug has been turn to high-risk through fuzzing. And sym-xxx shows the results from symbolic execution, the final report is printed on the bottom of symbolic_execution.log file.

2021-10-01 06:28:45,425 Thread 0: *******************primitives*******************

2021-10-01 06:28:45,425 Thread 0: Running for 0:01:50.495701
2021-10-01 06:28:45,425 Thread 0: Total 3 primitives found during symbolic execution

2021-10-01 06:28:45,425 Thread 0: The number of OOB/UAF write is 2

2021-10-01 06:28:45,425 Thread 0: The number of arbitrary address write is 0

2021-10-01 06:28:45,425 Thread 0: The number of constrained address write is 0

2021-10-01 06:28:45,425 Thread 0: The number of arbitrary value write is 0

2021-10-01 06:28:45,425 Thread 0: The number of constrained value write is 0

2021-10-01 06:28:45,425 Thread 0: The number of control flow hijacking is 1

2021-10-01 06:28:45,425 Thread 0: The number of invalid free is 0

2021-10-01 06:28:45,425 Thread 0: ************************************************