Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Y Zheng, Y Li, C Zhang, H Zhu, Y Liu… - Proceedings of the 31st …, 2022 - dl.acm.org
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …

Nezha: Efficient domain-independent differential testing

T Petsios, A Tang, S Stolfo… - … IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Differential testing uses similar programs as cross-referencing oracles to find semantic bugs
that do not exhibit explicit erroneous behaviors like crashes or assertion failures …

Testing of autonomous driving systems: where are we and where should we go?

G Lou, Y Deng, X Zheng, M Zhang… - Proceedings of the 30th …, 2022 - dl.acm.org
Autonomous driving has shown great potential to reform modern transportation. Yet its
reliability and safety have drawn a lot of attention and concerns. Compared with traditional …

A distributed safety mechanism using middleware and hypervisors for autonomous vehicles

T Bijlsma, A Buriachevskyi, A Frigerio… - … , Automation & Test …, 2020 - ieeexplore.ieee.org
Autonomous vehicles use cyber-physical systems to provide comfort and safety to
passengers. Design of safety mechanisms for such systems is hindered by the growing …

[引用][C] A review of fuzzing techniques

Z Ren, H Zheng, J Zhang, W Wang, T Feng, H Wang… - 2021 - Science Press

Ml-driven malware that targets av safety

S Jha, S Cui, S Banerjee, J Cyriac… - 2020 50th annual …, 2020 - ieeexplore.ieee.org
Ensuring the safety of autonomous vehicles (AVs) is critical for their mass deployment and
public adoption. However, security attacks that violate safety constraints and cause …

{UNIFUZZ}: A holistic and pragmatic {Metrics-Driven} platform for evaluating fuzzers

Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen… - 30th USENIX Security …, 2021 - usenix.org
A flurry of fuzzing tools (fuzzers) have been proposed in the literature, aiming at detecting
software vulnerabilities effectively and efficiently. To date, it is however still challenging to …

Too afraid to drive: systematic discovery of semantic DoS vulnerability in autonomous driving planning under physical-world attacks

Z Wan, J Shen, J Chuang, X Xia, J Garcia, J Ma… - arXiv preprint arXiv …, 2022 - arxiv.org
In high-level Autonomous Driving (AD) systems, behavioral planning is in charge of making
high-level driving decisions such as cruising and stopping, and thus highly securitycritical. In …

HotFuzz: Discovering algorithmic denial-of-service vulnerabilities through guided micro-fuzzing

W Blair, A Mambretti, S Arshad, M Weissbacher… - arXiv preprint arXiv …, 2020 - arxiv.org
Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities
that allow adversaries to achieve either remote code execution or information disclosure …

Afgen: Whole-function fuzzing for applications and libraries

Y Liu, Y Wang, T Bao, X Jia, Z Zhang… - 2024 IEEE Symposium on …, 2023 - computer.org
Fuzzing technology has been widely used to discover vulnerabilities, but existing fuzzing
techniques still cannot cover and explore all functions in an application or a library. The …