A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Bleem: Packet sequence oriented fuzzing for protocol implementations

Z Luo, J Yu, F Zuo, J Liu, Y Jiang, T Chen… - 32nd USENIX Security …, 2023 - usenix.org
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …

[PDF][PDF] DynPRE: Protocol reverse engineering via dynamic inference

Z Luo, K Liang, Y Zhao, F Wu, J Yu, H Shi… - 31th Annual Network …, 2024 - fouzhe.github.io
Automatic protocol reverse engineering is essential for various security applications. While
many existing techniques achieve this task by analyzing static network traces, they face …

SNPSFuzzer: A fast greybox fuzzer for stateful network protocols using snapshots

J Li, S Li, G Sun, T Chen, H Yu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Greybox fuzzing has been widely used in stateless programs and has achieved great
success. However, most state-of-the-art greybox fuzzers have slow speed and shallow state …

Dark-skin individuals are at more risk on the street: Unmasking fairness issues of autonomous driving systems

X Li, Z Chen, JM Zhang, F Sarro, Y Zhang… - arXiv preprint arXiv …, 2023 - arxiv.org
This paper conducts fairness testing on automated pedestrian detection, a crucial but under-
explored issue in autonomous driving systems. We evaluate eight widely-studied pedestrian …

Logos: Log guided fuzzing for protocol implementations

F Wu, Z Luo, Y Zhao, Q Du, J Yu, R Peng… - Proceedings of the 33rd …, 2024 - dl.acm.org
Network protocols are extensively used in a variety of network devices, making the security
of their implementations crucial. Protocol fuzzing has shown promise in uncovering …

Minerva: browser API fuzzing with dynamic mod-ref analysis

C Zhou, Q Zhang, M Wang, L Guo, J Liang… - Proceedings of the 30th …, 2022 - dl.acm.org
Browser APIs are essential to the modern web experience. Due to their large number and
complexity, they vastly expand the attack surface of browsers. To detect vulnerabilities in …

Unicorn: detect runtime errors in time-series databases with hybrid input synthesis

Z Wu, J Liang, M Wang, C Zhou, Y Jiang - Proceedings of the 31st ACM …, 2022 - dl.acm.org
The ubiquitous use of time-series databases in the safety-critical Internet of Things domain
demands strict security and correctness. One successful approach in database bug …

A Retrospective Analysis of a Rapid Review on Fuzz Security Testing for Software Implementation of Communication Protocols

A Marchetto - SN Computer Science, 2024 - Springer
Software implementations of communication protocols connect systems and services by
allowing them to exchange data and information. The increasing request of secure …

A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory

J Fu, S Xiong, N Wang, R Ren, A Zhou… - … on Dependable and …, 2023 - ieeexplore.ieee.org
In recent years, security test of network protocols based on fuzzing has been attracting more
and more attentions. This is very challenging compared with the stateless software fuzzing …