Google3 CLs: http://cl/308666040 Bug: b/154264716 Test: Locally ran and built odk fuzz binaries and tested fuzzer binaries on pixel device Change-Id: Icdb81291e101a0abdb75f84008f701c06e7384d6 Change-Id: Iad573209b47bd450c843a7cab5570a76c012fce9
ODK Fuzzing
Objective
- Run fuzzing on ODK and KDO serialize and deserialize APIs using google supported fuzzer engines to find security vulnerabilities. Any issues found by clusterfuzz will be reported to odk fuzz buganizer.
Run fuzz target on local machine
-
In order to run fuzz target locally and see code coverage, save binary input to be tested against fuzz target into a temporary corpus directory and execute following commands
$ blaze build --config=asan-fuzzer //your:target $ blaze-bin/your/target FULL_CORPUS_DIR