News

Project and exam Q&A on Tuesday

Written on 25.01.26 by Alexander Liggesmeyer

We plan to hold a Project 2 discussion and an exam Q&A session in the next lecture on 27.01.
To answer some of your questions, we may provide a few examples.
If you have any questions you would like us to address, please post them in this thread so we can prepare our answers for Tuesday. 🙂 
Link:… Read more
We plan to hold a Project 2 discussion and an exam Q&A session in the next lecture on 27.01.
To answer some of your questions, we may provide a few examples.
If you have any questions you would like us to address, please post them in this thread so we can prepare our answers for Tuesday. 🙂 
Link: https://cms.cispa.saarland/fuzzing25/forum/viewtopic.php?t=170

Assignment 10 has been released

Written on 20.01.26 (last change on 20.01.26) by Alexander Liggesmeyer

We’ve just released Assignment 10

You can find it under the Materials section in the CMS:

https://cms.cispa.saarland/fuzzing25/materials/

Happy fuzzing!

Project 2 Repository Update

Written on 16.01.26 (last change on 16.01.26) by Alexander Liggesmeyer

We have updated the Project 2 repositories after discovering an issue in some of the test cases. A Java null value was incorrectly used where the Python equivalent None was intended.

This has now been corrected, and the fix has already been merged into your Project 2 repositories on GitHub. If you… Read more

We have updated the Project 2 repositories after discovering an issue in some of the test cases. A Java null value was incorrectly used where the Python equivalent None was intended.

This has now been corrected, and the fix has already been merged into your Project 2 repositories on GitHub. If you have a local clone of the repository, please make sure to pull the latest commits so your local version is up to date.

We also expanded the Fandango info section in the exercise description, in order to give you some more details about how to use the Party definitions provided.

No further action is required beyond updating your local repository.

GitHub Classroom Repository Access Issue for Project 2 and Assignments

Written on 15.01.26 (last change on 15.01.26) by Alexander Liggesmeyer

Due to an issue on GitHub's side, some of you may not get immediate access to your assignment repository after accepting a GitHub Classroom assignment. Instead you see a page saying "Repository access issue". Here's how to resolve this:

After you accept an assignment, GitHub does send you an… Read more

Due to an issue on GitHub's side, some of you may not get immediate access to your assignment repository after accepting a GitHub Classroom assignment. Instead you see a page saying "Repository access issue". Here's how to resolve this:

After you accept an assignment, GitHub does send you an invitation email to the repository. You must accept this invitation before you can access your repository.

What you should do

  1. Check the email address linked to your GitHub account for a repository invitation.

  2. Accept the invitation from the email to gain access to your assignment repository.

If you cannot find the invitation email

If you do not see the invitation email, you can still accept it manually by visiting your repository link in your browser:

https://github.com/fuzzing2526/2526-assignment-09-[YourGitHubUsername]/

or

https://github.com/fuzzing2526/project-2-[YourGitHubUsername]/

Example

If your GitHub username is 'ExampleUser', visit:

https://github.com/fuzzing2526/2526-assignment-09-ExampleUser/

or

https://github.com/fuzzing2526/project-2-ExampleUser/

 

 

⁦Course Updates: Project 2 Released, Grades for Project 1 Published, and Assignment Changes

Written on 14.01.26 (last change on 14.01.26) by Valentin Huber

Project 2 has now been released and is available on GitHub Classroom, you find the link in the CMS in the materials section, as usual. Please make sure to read the project description carefully and plan your work accordingly.

The grades for project 1 have been published and can be viewed in the… Read more

Project 2 has now been released and is available on GitHub Classroom, you find the link in the CMS in the materials section, as usual. Please make sure to read the project description carefully and plan your work accordingly.

The grades for project 1 have been published and can be viewed in the grading system. Students who used custom seeds will receive 0 points for both parts, students who didn't pass the minimum coverage for either part will receive 0 points for the failed part(s). For fairness' sake with regards to the students who used their own seeds, we will also drop the requirement that project 1 needs to be passed to pass the course. Students who received a non-passing grade for project 1 will need to make up for the missing points in assignments, project 2 and the exam.

❗️Please check your points in the CMS and notify us if you cannot see them.

The new rules are as follows: the projects individually, the asssignments as a total, and the exam will each contribute 25% of your final grade, with each scaled to its respective maximum points. You need to pass all of the following with a passing grade to pass the course: project 2, the assignments (as a whole), and the exam.

Please note a change to the assignment schedule. The assignment sheet planned for this week will be skipped, as you have already done compiler fuzzing in project 1. Instead, the remaining two assignment sheets later in the course will each be worth 15 points.

Additionally, we encountered an permission issue with Assignment 9 that affected 2 students. These students did not receive writing permissions for their assignment repository. If you were affected, you saw a page saying “Repository access issue” when accepting the assignment. If this applies to you, please visit

https://github.com/fuzzing2526/2526-assignment-09-[YourGitHubUsername]/

and accept the invitation manually.

For example is your github username is 'examplename':

https://github.com/fuzzing2526/2526-assignment-09-examplename/

Due to this issue, the deadline for Assignment 9 has been extended by two days for everyone. The new deadline is 16.01.2026 at 14:00 CET.⁦ If you are not able to accept the assignment, contact alexander.liggesmeyer@cispa.de.

Talk by Marcel Böhme, Fuzzing Book co-author, on 13 January 10:00

Written on 08.01.26 (last change on 14.01.26) by Andreas Zeller

On January 13 at 10:00, Marcel Böhme, co-author of the Fuzzing Book and an eminent fuzzing researcher, will visit CISPA. Feel free to join us for his talk. (Our regular lecture will still take place at 14:15.) Details on Marcel's talk below:

Marcel Böhme: Automatic Software Security at Scale
Read more

On January 13 at 10:00, Marcel Böhme, co-author of the Fuzzing Book and an eminent fuzzing researcher, will visit CISPA. Feel free to join us for his talk. (Our regular lecture will still take place at 14:15.) Details on Marcel's talk below:

Marcel Böhme: Automatic Software Security at Scale
January 13, 10:00 - 11:30, CISPA Stuhlsatzenhaus Lecture Hall

Abstract. The security of our software systems has never been more important. Just this week, a Principal Engineer at Google announced that a coding agent created in a few hours what her entire team spent one year to build. Soon, our software systems will rapidly change and evolve with minimal human intervention in reaction to user needs and requirements. Yet, as we are grappling with LLM hallucinations and trustworthiness, how do we ensure that our systems today and those “machine-developed” systems of the future are reliable and secure?
In this talk, we will explore the exciting opportunities and the fundamental limitations of automatic security analysis and testing techniques. We will discuss why only an exponential increase in the number of machines will give us at most a linear increase in the number of bugs that a security testing tool can find and why, once we have started, we can never really stop running automatic, continuous security testing. We will discuss the degree to which testing can show the absence of bugs and extend our statistical approach to a more general paradigm called empirical program analysis which scales to the machine-developed software systems of the future.

Bio. Marcel Böhme is a faculty member at the Max Planck Institute for Security and Privacy (MPI-SP) where he leads the Software Security group. He is the elected Spokesperson for Research Group Leaders at the Chemistry, Physics, and Technology Section of the Max Planck Society, a Guest Editor-in-Chief and Associate Editor for the ACM TOSEM, the flagship journal in Software Engineering, and on the steering committees of ASE and ISSTA, two of the largest, premier conferences in his area. He was named 2025 ACM Distinguished Member and won a 2024 ERC Consolidator grant, a 2022 NUS Outstanding Young Computing Alumni Award, a 2019 ARC DECRA (Australia's ERC Starting), and several ACM Distinguished Paper awards, spotlights, and highlights at the premier publication venues for security and software engineering. Marcel received his PhD at the National University of Singapore. To find out more about his group and their research, head over to: https://mpi-softsec.github.io.

Assignment 09 has been released

Written on 06.01.26 by Alexander Liggesmeyer

We’ve just released Assignment 09

You can find it under the Materials section in the CMS:

https://cms.cispa.saarland/fuzzing25/materials/

Please excuse the delayed release. We adjusted the deadline by one day (14.01.2026) to make up for that.

Happy fuzzing!

Course Evaluation

Written on 16.12.25 (last change on 30.12.25) by Andreas Zeller

We constantly aim to improve our course offerings. Please take a moment to provide feedback on the "Security Testing" course:

    https://qualis.uni-saarland.de/eva/?l=160324&p=3rr2s1

The link is active until January 12, 2026.

Project 1: Bugfixes and Setup Time Changes

Written on 11.12.25 by Valentin Huber

I was made aware of two distinct bugs with the project setup, and found one cheating avenue, all of which was fixed by a commit that was just pushed to the repositories of all students that have already accepted the project 1 (please run git pull!) — students who have not yet accepted the project will… Read more

I was made aware of two distinct bugs with the project setup, and found one cheating avenue, all of which was fixed by a commit that was just pushed to the repositories of all students that have already accepted the project 1 (please run git pull!) — students who have not yet accepted the project will automatically get the newest version. Here are the changes in detail:

  • Previously, the runtime of any logic run at the top level of fuzzer.py (or any other file imported from there) was not accounted. This means that in principle, students would have been able to use an arbitrary amount of runtime to pre-compute inputs, such that their entire hour of running the target could be spent in the target, even when using a very slow fuzzer. This would obviously be considered cheating. We have changed the behavior as follows: The setup logic is now times. If it takes longer than 5 minutes, any additional time is deducted from your fuzzing budget. Some examples:
    • If your setup logic takes 3 seconds, you will get 60 minutes of fuzzing.
    • If your setup logic takes 4.5 minutes, you will still get 60 minutes of fuzzing.
    • If your setup logic takes 8 (5 + 3 extra) minutes, you will only get 57 (60 - 3) minutes of fuzzing.
  • On Windows systems, git has (as is normal for its operation) converted the line endings of non-binary files to CRLF, instead of the LF used in UNIX, when you cloned the repository. This is done to allow ordinary Windows programs to change the files. The line endings are changed back once the changes are pulled to a UNIX system. However, on a Windows machine, some files (specifically apt-packages.txt and run_and_get_coverage.sh) are simply copied from the Windows host to the Ubuntu Docker image, without the intermediate fixes through git. This lead to failures when trying to build the Docker images on Windows systems, since the extra characters are not legal in those places in Ubuntu. To fix this, the line endings are now manually converted in the Dockerfile.
  • If your fuzzer called some other process that either (a) calls the default system-wide Python interpreter, or (b) is only available as a Python dependency, this would previously fail, because the virtual environment, into which all Python dependencies are installed, was not correctly activated. This should now be fixed.

If you have any questions regarding these changes, please ask them in the forum. I would also like to thank all the students that have reported these bugs and helped me find fixes. Enjoy your fuzzing!

Confusion with the deadline for Assignment 6

Written on 03.12.25 (last change on 05.12.25) by Tural Mammadov

We have just noticed that we made a mistake with the deadline for Assignment 6, specifying December 16th instead of December 9th. To avoid any potential confusion, we will not be changing the deadline for Assignment 6. We will collect your solutions on December 16th. However, we still encourage you to… Read more

We have just noticed that we made a mistake with the deadline for Assignment 6, specifying December 16th instead of December 9th. To avoid any potential confusion, we will not be changing the deadline for Assignment 6. We will collect your solutions on December 16th. However, we still encourage you to complete Assignment 6 this week, as we will release Assignment 7 next week. As usual, you will have 7 days to solve it. So, both solutions for Assignments 6 and 7 will be collected on December 16th. Happy fuzzing!

Project 1 – Scope Adjustment

Written on 19.11.25 (last change on 19.11.25) by Valentin Huber

After some questions and further evaluation by us, we found that project 1 has a shortcut that we deem unfair: If you happened to find a set of very good seed inputs (and there are plenty of those lists out there), you were basically guaranteed to get the maximum grade, even without having to write a… Read more

After some questions and further evaluation by us, we found that project 1 has a shortcut that we deem unfair: If you happened to find a set of very good seed inputs (and there are plenty of those lists out there), you were basically guaranteed to get the maximum grade, even without having to write a fuzzer. We have therefore split the project 1 evaluation into two parts: One with no seeds, and one with a small set of high-quality seeds provided by us. This will provide a more even playing ground for everybody.

For those of you who previously accepted the assignment: I pushed the changes to your repository directly. Please run git pull. For those of you who have not: You will get the updated instructions directly, once you do accept the assignment.

Refer to the README for the updated instructions and rules. Please re-read the entire README, as multiple things have changed. We are sorry about the inconvenience, particularly to students who have already discovered this and put in some work to find good seeds. If you have any questions regarding the new rules, please ask in the forum.

Deadline extension for Assignment 03

Written on 18.11.25 by Alexander Liggesmeyer

We were informed that the deadline for Assignment 03 was shown as 14:00 in the CMS, but the assignment sheet and the announcement in the GitHub classroom stated 12:00. To resolve this inconsistency, we have extended the deadline by one day (19. November at 14:00).

Project 1 Released

Written on 15.11.25 (last change on 18.11.25) by Valentin Huber

All details are available directly in the README of the repository. The deadline is end of the end in CET on 23.12. Find the repository in GitHub classroom.

The preliminary dates for project 2 are: release on 13.01., deadline on 03.03.

Exam dates are specified

Written on 11.11.25 by Tural Mammadov

Dear Students, the exam dates for the "Security Testing" course are now specified:

  • 2026-02-19 Günter Hotz Hörsaal 10:00-12:00 – exam
  • 2026-03-16 Günter Hotz Hörsaal 14:00-16:00 – re-exam

Online notebooks work again

Written on 21.10.25 by Andreas Zeller

Dear all – you can now (again) launch interactive notebooks right out of fuzzingbook.org. Simply select Resources -> Edit as Notebook.

Accessing GitHub Classroom

Written on 21.10.25 by Tural Mammadov

Dear Students,

If you do not find your matriculation number listed on Security Testing GitHub Classroom (for example, you registered later), please reach out to AlexanderTural, or Valentin.

Assignment 00 has been released

Written on 21.10.25 (last change on 21.10.25) by Alexander Liggesmeyer

We’ve just released Assignment 00

You can find it under the Materials section in the CMS:

https://cms.cispa.saarland/fuzzing25/materials/

This initial assignment is meant to get you familiar with the submission process and ensure your setup is ready for the upcoming exercises.

Happy fuzzing!

Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.