We are a study group of undergraduate researchers from the CPS-LAB at Gachon University, dedicated to studying and researching fuzzing and system hacking techniques. Our goal is to conduct in-depth system security research to discover vulnerabilities and obtain CVE (Common Vulnerabilities and Exposures) identifiers.
We focus on proactively identifying and analyzing potential security threats in software. By learning and applying the latest fuzzing techniques to real-world systems, we gain hands-on experience in discovering security vulnerabilities. Through these efforts, we aim to grow into the next generation of system security experts.
- Key Research Areas: Fuzzing Automation, Kernel Fuzzing, System Vulnerability Analysis, Reverse Engineering
- Objectives: Discovering vulnerabilities in major open-source software and registering CVEs, participating in domestic and international hacking competitions, and writing research papers.
- GitHub: https://github.com/cps-lab-study
We are actively working on various projects to build our research portfolio. We plan to add our discovered CVEs, developed tools, and presentation materials here.
Our projects are currently under development. We look forward to sharing our achievements soon!
We value knowledge sharing and collaboration. We are eager to learn and grow with individuals who are passionate about system hacking and fuzzing.
Our study group thrives on the participation of its members. You can contribute in the following ways:
- Propose New Research Ideas: Suggest new fuzzing techniques or targets worth exploring together via [Issues].
- Code Review and Improvement Suggestions: You can suggest improvements for our ongoing tool development or project code through [Pull Requests].
- Participate and Present in Study Sessions: Join our regular study sessions to share knowledge and engage in discussions.