Massive software applications possess complex data structures or parse complex data structures; in such cases, vulnerabilities in the software become inevitable. The …
Among the many software testing techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated, and any flaws may undermine even formally verified software executing on top …
P Godefroid, MY Levin, DA Molnar - NDSS, 2008 - pxzhang.cn
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program …
S Nagy, M Hicks - 2019 IEEE Symposium on Security and …, 2019 - ieeexplore.ieee.org
Coverage-guided fuzzing is one of the most successful approaches for discovering software bugs and security vulnerabilities. Of its three main components:(1) test case generation,(2) …
D Molnar, XC Li, DA Wagner - USENIX Security Symposium, 2009 - usenix.org
Recently, integer bugs, including integer overflow, width conversion, and signed/unsigned conversion errors, have risen to become a common root cause for serious security …
S Ye, J Lang, F Wu - 2010 12th International Asia-Pacific Web …, 2010 - ieeexplore.ieee.org
Extensive research has been conducted on top of online social networks (OSNs), while little attention has been paid to the data collection process. Due to the large scale of OSNs and …
S Bekrar, C Bekrar, R Groz… - 2012 IEEE fifth …, 2012 - ieeexplore.ieee.org
Fuzzing is one of the most popular test-based software vulnerability detection techniques. It consists in running the target application with dedicated inputs in order to exhibit potential …