Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing

U Kargén, N Shahmehri - Proceedings of the 2015 10th Joint Meeting on …, 2015 - dl.acm.org
… interpretation thereof, is an attractive alternative for security testing. In this paper we consider
fuzz testing, a practical and popular black-box technique for automatic test case generation. …

Efficient file fuzz testing using automated analysis of binary file format

HC Kim, YH Choi, DH Lee - Journal of Systems Architecture, 2011 - Elsevier
… file format is not readable because it consists of binary codes such as 0xD3 0x3E. Binary
file fuzz testing inserts unexpected data (faults) into the binary files to make fuzzed data (fault-…

A Study on Using Code Coverage Information Extracted from Binary to Guide Fuzzing.

B Lou, J Song - International Journal of Computer Science and Security …, 2020 - go.gale.com
… guide the fuzz testing, such as symbolic execution, concolic execution, grammar, taint analysis,
… coverage can be measured by instrumenting the source code or binary code, as well as …

Grey-box concolic testing on binary code

J Choi, J Jang, C Han, SK Cha - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
… INTRODUCTION Fuzz testing (fuzzing for short) has been the de facto standard for finding
security vulnerabilities in closed binary code [1]. Security practitioners appreciate fuzzing

Binary-oriented hybrid fuzz testing

D Fangquan, D Chaoqun, Z Yao… - 2015 6th IEEE …, 2015 - ieeexplore.ieee.org
… But in conclusion, hybrid fuzz testing can guarantee higher code coverage … testing method,
hybrid fuzz testing, to test binary programs. In the testing process, the module of binary code

T-Fuzz: fuzzing by program transformation

H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
… techniques to generate test cases to bypass complex input checks in the code, we simply …
In T-Fuzz, we use binary rewriting to negate detected NCC candidates in the target program…

In-memory fuzzing for binary code similarity analysis

S Wang, D Wu - … 32nd IEEE/ACM International Conference on …, 2017 - ieeexplore.ieee.org
fuzz testing mutates the program inputs, we have noticed a special fuzzing technique that
is designed to directly fuzz … cells, ie, in-memory fuzzing (Chapters 19 and 20 in [61]). In-memory …

Ffuzz: Towards full system high coverage fuzz testing on binary executables

B Zhang, J Ye, X Bi, C Feng, C Tang - PloS one, 2018 - journals.plos.org
fuzz testing on a full system software stack based on fuzz testing and selective symbolic
execution. … to assist fuzz testing to penetrate into deeper code spaces and improve the coverage. …

[PDF][PDF] Hybrid fuzz testing: Discovering software bugs via fuzzing and symbolic execution

BS Pak - School of Computer Science Carnegie …, 2012 - reports-archive.adm.cs.cmu.edu
… Static binary analysis is based on the same concept as static code analysis … in binary code
as opposed to source code. Thus, it shares a lot of advantages and limitations of static code

Evaluating fuzz testing

G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing … of fuzz testing