Skip to content

Latest commit

 

History

History
58 lines (50 loc) · 2.52 KB

File metadata and controls

58 lines (50 loc) · 2.52 KB
layout default
title ClusterFuzz
permalink /
nav_order 1
has_children true

ClusterFuzz

ClusterFuzz is a scalable fuzzing infrastructure that finds security and stability issues in software.

Google uses ClusterFuzz to fuzz all Google products and as the fuzzing backend for OSS-Fuzz.

ClusterFuzz provides many features to seamlessly integrate fuzzing into a software project's development process:

  • Highly scalable. Can run on any size cluster (e.g. Google's instance runs on 30,000 VMs).
  • Accurate deduplication of crashes.
  • Fully automatic bug filing, triage and closing for various issue trackers (e.g. Monorail, Jira).
  • Supports multiple [coverage guided fuzzing engines] (libFuzzer, AFL++ and Honggfuzz) for optimal results (with [ensemble fuzzing] and [fuzzing strategies]).
  • Support for [blackbox fuzzing].
  • Testcase minimization.
  • Regression finding through bisection.
  • Statistics for analyzing fuzzer performance, and crash rates.
  • Easy to use web interface for management and viewing crashes.
  • Support for various authentication providers using Firebase.

Trophies

As of May 2022, ClusterFuzz has found 25,000+ bugs in Google (e.g. Chrome) and 36,000+ bugs in over 550 open source projects integrated with OSS-Fuzz.

[blackbox fuzzing]: {{ site.baseurl }}/setting-up-fuzzing/blackbox-fuzzing/ [coverage guided fuzzing engines]: {{ site.baseurl }}/setting-up-fuzzing/libfuzzer-and-afl/ [fuzzing strategies]: https://i.blackhat.com/eu-19/Wednesday/eu-19-Arya-ClusterFuzz-Fuzzing-At-Google-Scale.pdf#page=27 [ensemble fuzzing]: https://www.usenix.org/system/files/sec19-chen-yuanliang.pdf