Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Secure-by-construction synthesis of cyber-physical systems

S Liu, A Trivedi, X Yin, M Zamani - Annual Reviews in Control, 2022 - Elsevier
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …

Fuzzing: Challenges and reflections

M Böhme, C Cadar, A Roychoudhury - IEEE Software, 2020 - ieeexplore.ieee.org
Fuzzing: Challenges and Reflections Page 1 MAY/JUNE 2021 | IEEE SOFTWARE 79 FOCUS:
ON SOFTWARE QUALITY This work is licensed under a Creative Commons Attribution 4.0 …

{PolyFuzz}: Holistic Greybox Fuzzing of {Multi-Language} Systems

W Li, J Ruan, G Yi, L Cheng, X Luo, H Cai - 32nd USENIX Security …, 2023 - usenix.org
While offering many advantages during software process, the practice of using multiple
programming languages in constructing one software system also introduces additional …

A systematic evaluation of automated tools for side-channel vulnerabilities detection in cryptographic libraries

A Geimer, M Vergnolle, F Recoules, LA Daniel… - Proceedings of the …, 2023 - dl.acm.org
To protect cryptographic implementations from side-channel vulnerabilities, developers must
adopt constant-time programming practices. As these can be error-prone, many side …

Fuzz, penetration, and ai testing for soc security verification: Challenges and solutions

KZ Azar, MM Hossain, A Vafaei, H Al Shaikh… - Cryptology ePrint …, 2022 - eprint.iacr.org
The ever-increasing usage and application of system-on-chips (SoCs) has resulted in the
tremendous modernization of these architectures. For a modern SoC design, with the …

MTFuzz: fuzzing with a multi-task neural network

D She, R Krishna, L Yan, S Jana, B Ray - … of the 28th ACM joint meeting …, 2020 - dl.acm.org
Fuzzing is a widely used technique for detecting software bugs and vulnerabilities. Most
popular fuzzers generate new inputs using an evolutionary search to maximize code …

Fuzzfactory: domain-specific fuzzing with waypoints

R Padhye, C Lemieux, K Sen, L Simon… - Proceedings of the …, 2019 - dl.acm.org
Coverage-guided fuzz testing has gained prominence as a highly effective method of finding
security vulnerabilities such as buffer overflows in programs that parse binary data …

T-reqs: Http request smuggling with differential fuzzing

B Jabiyev, S Sprecher, K Onarlioglu… - Proceedings of the 2021 …, 2021 - dl.acm.org
HTTP Request Smuggling (HRS) is an attack that exploits the HTTP processing
discrepancies between two servers deployed in a proxy-origin configuration, allowing …

Socfuzzer: Soc vulnerability detection using cost function enabled fuzz testing

MM Hossain, A Vafaei, KZ Azar… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
The modern System-on-Chips (SoCs), with numerous complex and heterogeneous
intellectual properties (IPs), and the inclusion of highly-sensitive assets, become the target of …