aboutsummaryrefslogtreecommitdiff
path: root/en/devices/tech/debug/fuzz-sanitize.html
blob: 55c517da35f58c614e2f2250bdc774518182bfb1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
<html devsite>
  <head>
    <title>Dynamic Analysis</title>
    <meta name="project_path" value="/_project.yaml" />
    <meta name="book_path" value="/_book.yaml" />
  </head>
  <body>
  <!--
      Copyright 2017 The Android Open Source Project

      Licensed under the Apache License, Version 2.0 (the "License");
      you may not use this file except in compliance with the License.
      You may obtain a copy of the License at

          //www.apache.org/licenses/LICENSE-2.0

      Unless required by applicable law or agreed to in writing, software
      distributed under the License is distributed on an "AS IS" BASIS,
      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
      See the License for the specific language governing permissions and
      limitations under the License.
  -->

  <p>This section summarizes useful tools for dynamic analysis and debugging
  from a security perspective. It covers some tools for fuzzing, sanitizing,
  and preemptively mitigating exploits. For general debugging, see
  <a href="/devices/tech/debug/">the debugging section</a>.</p>

<p>
While Android has supported fuzzing tools for many releases, Android 8.0
and later include more fuzzing support, tighter fuzzing tool integration in the
Android build system, and greater dynamic analysis support on the Android kernels.
</p>
</body></html>