Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

Large language models are zero-shot fuzzers: Fuzzing deep-learning libraries via large language models

Y Deng, CS Xia, H Peng, C Yang, L Zhang - Proceedings of the 32nd …, 2023 - dl.acm.org
Deep Learning (DL) systems have received exponential growth in popularity and have
become ubiquitous in our everyday life. Such systems are built on top of popular DL …

Fuzzbench: an open fuzzer benchmarking platform and service

J Metzman, L Szekeres, L Simon, R Sprabery… - Proceedings of the 29th …, 2021 - dl.acm.org
Fuzzing is a key tool used to reduce bugs in production software. At Google, fuzzing has
uncovered tens of thousands of bugs. Fuzzing is also a popular subject of academic …

Large language models are edge-case fuzzers: Testing deep learning libraries via fuzzgpt

Y Deng, CS Xia, C Yang, SD Zhang, S Yang… - arXiv preprint arXiv …, 2023 - arxiv.org
Deep Learning (DL) library bugs affect downstream DL applications, emphasizing the need
for reliable systems. Generating valid input programs for fuzzing DL libraries is challenging …

Embedded fuzzing: a review of challenges, tools, and solutions

M Eisele, M Maugeri, R Shriwas, C Huth, G Bella - Cybersecurity, 2022 - Springer
Fuzzing has become one of the best-established methods to uncover software bugs.
Meanwhile, the market of embedded systems, which binds the software execution tightly to …

[PDF][PDF] Large language model guided protocol fuzzing

R Meng, M Mirchev, M Böhme… - Proceedings of the …, 2024 - ndss-symposium.org
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …

An empirical study on the effectiveness of static C code analyzers for vulnerability detection

S Lipp, S Banescu, A Pretschner - Proceedings of the 31st ACM …, 2022 - dl.acm.org
Static code analysis is often used to scan source code for security vulnerabilities. Given the
wide range of existing solutions implementing different analysis techniques, it is very …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

Magma: A ground-truth fuzzing benchmark

A Hazimeh, A Herrera, M Payer - … of the ACM on Measurement and …, 2020 - dl.acm.org
High scalability and low running costs have made fuzz testing the de facto standard for
discovering software bugs. Fuzzing techniques are constantly being improved in a race to …

Libafl: A framework to build modular and reusable fuzzers

A Fioraldi, DC Maier, D Zhang, D Balzarotti - Proceedings of the 2022 …, 2022 - dl.acm.org
The release of AFL marked an important milestone in the area of software security testing,
revitalizing fuzzing as a major research topic and spurring a large number of research …