| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | |||||
| 3 | 4 | 5 | 6 | 7 | 8 | 9 |
| 10 | 11 | 12 | 13 | 14 | 15 | 16 |
| 17 | 18 | 19 | 20 | 21 | 22 | 23 |
| 24 | 25 | 26 | 27 | 28 | 29 | 30 |
| 31 |
Tags
- 묵상
- build
- binary code analaysis
- Software Engineering
- ICSE
- Cyber Security
- software-testing
- Environment
- graphfuzz
- software-engineering
- 프로그램 분석
- 바이너리 분석
- protobuf
- fault-localization
- unit-testing
- 대학원생
- 느헤미야
- sotware-testing
- 생명의 삶
- fuzzing
- libxml2
- reading critique
- binary code analysis
- QT
- linking
- vulnerabilties
- 소프트웨어 취약저 분석
- citrus
- FSE
- libFuzzer
Archives
- Today
- Total
목록linking (1)
heechan.yang
ProblemWhen executing fuzz target of libxml2, LLVM packages fails to look up a symbol.==4057849==ERROR: AddressSanitizer: stack-overflow on address 0x7ffe0c142ff8 (pc 0x7b366db5927c bp 0x7ffe0c143020 sp 0x7ffe0c143000 T0)/usr/bin/llvm-symbolizer-13: symbol lookup error: /home/yangheechan/test-libxml2/bug/.libs/libxml2.so.2: undefined symbol: __asan_option_detect_stack_use_after_returnExecuting c..
Computer Science
2024. 10. 5. 13:04