Selectfuzz: Efficient directed fuzzing with selective path exploration

C Luo, W Meng, P Li - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …

Greybox Fuzzing of Distributed Systems

R Meng, G Pîrlea, A Roychoudhury… - Proceedings of the 2023 …, 2023 - dl.acm.org
Grey-box fuzzing is the lightweight approach of choice for finding bugs in sequential
programs. It provides a balance between efficiency and effectiveness by conducting a …

Transformer-based vulnerability detection in code at EditTime: Zero-shot, few-shot, or fine-tuning?

A Chan, A Kharkar, RZ Moghaddam… - arXiv preprint arXiv …, 2023 - arxiv.org
Software vulnerabilities bear enterprises significant costs. Despite extensive efforts in
research and development of software vulnerability detection methods, uncaught …

A Usability Evaluation of AFL and libFuzzer with CS Students

S Plöger, M Meier, M Smith - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
In top-tier companies and academia, fuzzing has established itself as a valuable tool for
finding bugs. It is a tool created by experts for experts, and a lot of research is being invested …

The Human Side of Fuzzing: Challenges Faced by Developers During Fuzzing Activities

O Nourry, Y Kashiwa, B Lin, G Bavota… - ACM Transactions on …, 2023 - dl.acm.org
Fuzz testing, also known as fuzzing, is a software testing technique aimed at identifying
software vulnerabilities. In recent decades, fuzzing has gained increasing popularity in the …

SoK: Prudent Evaluation Practices for Fuzzing

M Schloegel, N Bars, N Schiller, L Bernhard… - arXiv preprint arXiv …, 2024 - arxiv.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

HTFuzz: Heap Operation Sequence Sensitive Fuzzing

Y Yu, X Jia, Y Liu, Y Wang, Q Sang, C Zhang… - Proceedings of the 37th …, 2022 - dl.acm.org
Heap-based temporal vulnerabilities (ie, use-after-free, double-free and null pointer
dereference) are highly sensitive to heap operation (eg, memory allocation, deallocation …

Deep learning for coverage-guided fuzzing: How far are we?

S Li, X Xie, Y Lin, Y Li, R Feng, X Li… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Fuzzing is a widely-used software vulnerability discovery technology, many of which are
optimized using coverage-feedback. Recently, some techniques propose to train deep …

On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities

Z Li, N Wang, D Zou, Y Li, R Zhang, S Xu… - Proceedings of the …, 2024 - dl.acm.org
Software vulnerabilities are a major cyber threat and it is important to detect them. One
important approach to detecting vulnerabilities is to use deep learning while treating a …

SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions

L Carvalho, R Degiovanni, M Cordy, N Aguirre… - Proceedings of the …, 2024 - dl.acm.org
LTL solvers check the satisfiability of Linear-time Temporal Logic (LTL) formulas and are
widely used for verifying and testing critical software systems. Thus, potential bugs in the …