Evocatio: Conjuring bug capabilities from a single poc

Z Jiang, S Gan, A Herrera, F Toffalini… - Proceedings of the …, 2022 - dl.acm.org
The popularity of coverage-guided greybox fuzzers has led to a tsunami of security-critical
bugs that developers must prioritize and fix. Knowing the capabilities a bug exposes (eg …

Evaluating synthetic bugs

J Bundt, A Fasano, B Dolan-Gavitt… - Proceedings of the …, 2021 - dl.acm.org
Fuzz testing has been used to find bugs in programs since the 1990s, but despite decades
of dedicated research, there is still no consensus on which fuzzing techniques work best …

{ParmeSan}: Sanitizer-guided greybox fuzzing

S Österlund, K Razavi, H Bos, C Giuffrida - 29th USENIX Security …, 2020 - usenix.org
One of the key questions when fuzzing is where to look for vulnerabilities. Coverage-guided
fuzzers indiscriminately optimize for covering as much code as possible given that bug …

A flexible framework for expediting bug finding by leveraging past (mis-) behavior to discover new bugs

S Das, K James, J Werner, M Antonakakis… - Proceedings of the 36th …, 2020 - dl.acm.org
Among various fuzzing approaches, coverage-guided grey-box fuzzing is perhaps the most
prominent, due to its ease of use and effectiveness. Using this approach, the selection of …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

Binary-level directed fuzzing for {use-after-free} vulnerabilities

MD Nguyen, S Bardin, R Bonichon, R Groz… - … on Research in Attacks …, 2020 - usenix.org
Directed fuzzing focuses on automatically testing specific parts of the code by taking
advantage of additional information such as (partial) bug stack trace, patches or risky …

Directed greybox fuzzing

M Böhme, VT Pham, MD Nguyen… - Proceedings of the 2017 …, 2017 - dl.acm.org
Existing Greybox Fuzzers (GF) cannot be effectively directed, for instance, towards
problematic changes or patches, towards critical system calls or dangerous locations, or …

{Syzscope}: Revealing {high-risk} security impacts of {fuzzer-exposed} bugs in linux kernel

X Zou, G Li, W Chen, H Zhang, Z Qian - 31st USENIX Security …, 2022 - usenix.org
Fuzzing has become one of the most effective bug finding approach for software. In recent
years, 24* 7 continuous fuzzing platforms have emerged to test critical pieces of software …

Pafl: extend fuzzing optimizations of single mode to industrial parallel mode

J Liang, Y Jiang, Y Chen, M Wang, C Zhou… - Proceedings of the 2018 …, 2018 - dl.acm.org
Researchers have proposed many optimizations to improve the efficiency of fuzzing, and
most optimized strategies work very well on their targets when running in single mode with …

The fuzzing hype-train: How random testing triggers thousands of crashes

M Payer - IEEE Security & Privacy, 2019 - ieeexplore.ieee.org
Software contains bugs, and some bugs are exploitable. Mitigations protect our systems in
the presence of these vulnerabilities, often stopping the program once a security violation …