Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Fuzzing hardware like software

T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …

[PDF][PDF] Automated whitebox fuzz testing.

P Godefroid, MY Levin, DA Molnar - NDSS, 2008 - pxzhang.cn
Fuzz testing is an effective technique for finding security vulnerabilities in software.
Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program …

Full-speed fuzzing: Reducing fuzzing overhead through coverage-guided tracing

S Nagy, M Hicks - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Coverage-guided fuzzing is one of the most successful approaches for discovering software
bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …

[PDF][PDF] Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.

D Molnar, XC Li, DA Wagner - USENIX Security Symposium, 2009 - usenix.org
Recently, integer bugs, including integer overflow, width conversion, and signed/unsigned
conversion errors, have risen to become a common root cause for serious security …

Crawling online social graphs

S Ye, J Lang, F Wu - 2010 12th International Asia-Pacific Web …, 2010 - ieeexplore.ieee.org
Extensive research has been conducted on top of online social networks (OSNs), while little
attention has been paid to the data collection process. Due to the large scale of OSNs and …

A taint based approach for smart fuzzing

S Bekrar, C Bekrar, R Groz… - 2012 IEEE fifth …, 2012 - ieeexplore.ieee.org
Fuzzing is one of the most popular test-based software vulnerability detection techniques. It
consists in running the target application with dedicated inputs in order to exhibit potential …

[PDF][PDF] Fuzzing: Art, science, and engineering

VJM Manes, HS Han, C Han, SK Cha, M Egele… - arXiv preprint arXiv …, 2018 - jiliac.com
Authors' addresses: Valentin JM Manès, KAIST CSRC, 291 Daehak-ro, Yuseong-gu,
Daejeon, 34141, Korea, valentin. manes@ kaist. ac. kr; HyungSeok Han, KAIST, 291 …