Linear-time temporal logic guided greybox fuzzing

R Meng, Z Dong, J Li, I Beschastnikh… - Proceedings of the 44th …, 2022 - dl.acm.org
Software model checking as well as runtime verification are verification techniques which
are widely used for checking temporal properties of software systems. Even though they are …

ct-fuzz: Fuzzing for Timing Leaks

S He, M Emmi, G Ciocarlie - 2020 IEEE 13th International …, 2020 - ieeexplore.ieee.org
Testing-based methodologies like fuzzing are able to analyze complex software which is not
amenable to traditional formal approaches like verification, model checking, and abstract …

Exploring effective fuzzing strategies to analyze communication protocols

Y Chen, T Lan, G Venkataramani - … of the 3rd ACM Workshop on …, 2019 - dl.acm.org
In recent years, coverage-based greybox fuzzing has become popular forvulnerability
detection due to its simplicity and efficiency. However, it is less powerful when applied …

Stateful greybox fuzzing

J Ba, M Böhme, Z Mirzamomen… - 31st USENIX Security …, 2022 - usenix.org
Many protocol implementations are reactive systems, where the protocol process is in
continuous interaction with other processes and the environment. If a bug can be exposed …

Protocol state fuzzing of {TLS} implementations

J De Ruiter, E Poll - 24th USENIX Security Symposium (USENIX Security …, 2015 - usenix.org
We describe a largely automated and systematic analysis of TLS implementations by what
we call 'protocol state fuzzing': we use state machine learning to infer state machines from …

Finding and understanding bugs in software model checkers

C Zhang, T Su, Y Yan, F Zhang, G Pu, Z Su - … of the 2019 27th ACM joint …, 2019 - dl.acm.org
Software Model Checking (SMC) is a well-known automatic program verification technique
and frequently adopted for checking safety-critical software. Thus, the reliability of SMC tools …

Typestate-guided fuzzer for discovering use-after-free vulnerabilities

H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin… - Proceedings of the …, 2020 - dl.acm.org
Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge
coverage to guide the fuzzing process, which has shown great potential in finding …

Finding Specification Blind Spots via Fuzz Testing

R Ji, M Xu - 2023 IEEE Symposium on Security and Privacy (SP …, 2023 - ieeexplore.ieee.org
A formally verified program is only as correct as its specifications (SPEC). But how to assure
that the SPEC is complete and free of loopholes? This paper presents Fast, short for Fuzzing …

Fot: A versatile, configurable, extensible fuzzing framework

H Chen, Y Li, B Chen, Y Xue, Y Liu - Proceedings of the 2018 26th ACM …, 2018 - dl.acm.org
Greybox fuzzing is one of the most effective approaches for detecting software
vulnerabilities. Various new techniques have been continuously emerging to enhance the …

Utopia: Automatic generation of fuzz driver using unit tests

B Jeong, J Jang, H Yi, J Moon, J Kim… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Fuzzing is arguably the most practical approach for detecting security bugs in software, but a
non-trivial extent of efforts is required for its adoption. To be effective, high-quality fuzz …