How to find security flaws in a protocol implementation without a machine-readable specification of the protocol? Facing the internet, protocol implementations are particularly …
As an essential component responsible for communication, network services are security critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular …
A Andronidis, C Cadar - Proceedings of the 31st ACM SIGSOFT …, 2022 - dl.acm.org
In recent years, fuzz testing has benefited from increased computational power and important algorithmic advances, leading to systems that have discovered many critical bugs …
Grey-box fuzzing is the lightweight approach of choice for finding bugs in sequential programs. It provides a balance between efficiency and effectiveness by conducting a …
Protocol implementations are essential components in network infrastructures. Flaws hidden in the implementations can easily render devices vulnerable to adversaries. Therefore …
To date, various hybrid fuzzers have been proposed for maximal program vulnerability exposure by integrating the power of fuzzing strategies and concolic executors. While the …
J Ba, M Rigger - 2023 IEEE/ACM 45th International Conference …, 2023 - ieeexplore.ieee.org
Database systems are widely used to store and query data. Test oracles have been proposed to find logic bugs in such systems, that is, bugs that cause the database system to …
Z Zhang, H Zhang, J Zhao, Y Yin - Electronics, 2023 - mdpi.com
Network protocols, as the communication rules among computer network devices, are the foundation for the normal operation of networks. However, security issues arising from …
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past decade. After AFL popularized the groundbreaking concept of lightweight coverage …