FuzzBALL: Vine-based Binary Symbolic Execution
[Overview] [Source Code] [Publications] [Mailing List] [Back to BitBlaze]


FuzzBALL is a symbolic execution tool for binary code, based on the BitBlaze Vine library. (The name comes from the phrase "FUZZing Binaries with A Little Language", where "fuzzing" is a common application of symbolic execution to bug-finding, and the "little language" refers to the Vine intermediate language that FuzzBALL uses for execution. Also "fuzzball" is a common nickname for a small kitten, and FuzzBALL was (originally) intended to be simpler and lighter-weight than some other symbolic execution tools.)

Source Code

The source code for FuzzBALL is available via a public Git version control repository at GitHub.


Statically-Directed Dynamic Automated Test Generation
Domagoj Babic, Lorenzo Martignoni, Stephen McCamant, and Dawn Song. In Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), July 2011.

Path-Exploration Lifting: Hi-Fi Tests for Lo-Fi Emulators
Lorenzo Martignoni, Stephen McCamant, Pongsin Poosankam, Dawn Song, and Petros Maniatis. In Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2012.

Transformation-aware Exploit Generation using a HI-CFG
Dan Caselden, Alex Bazhanyuk, Mathias Payer, Laszlo Szekeres, Stephen McCamant and Dawn Song. Technical Report No. UCB/EECS-2013-85 May 16, 2013

Mailing List and Contact

We would like to hear if you are making use of FuzzBALL, if you run into any bugs or problems, or if you have suggestions for feature additions. Please subscribe to the bitblaze-users mailing list (via Google Groups) and share your experiences.

Back to BitBlaze