Given a vulnerable program, Model the vulnerability (the length of the source of the data is greater than that of the destination data in the sprinf function) by starting with declaring with buf and error as strings. then leverage Z3 (Z3 theorem prover) to generate concrete inputs of buf to trigger this bug/vulnerability.
Please mention your experience with cybersecurity, programming, and vulnerabilities.
Hello, i have good experience in Cyber security and programming. contact me.........................................................................................................................................................................................
$55 USD en 5 jours
5,0 (16 commentaires)
4,1
4,1
2 freelances proposent en moyenne $153 USD pour ce travail
Hey there,
I have been in the Information Security arena for years.
I had conducted tons of Computer Security related projects.
Would you share more details?
Regards.