Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

{AFL++}: Combining incremental steps of fuzzing research

A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX Workshop on …, 2020 - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …

Evaluating fuzz testing

G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing techniques …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Collafl: Path sensitive fuzzing

S Gan, C Zhang, X Qin, X Tu, K Li… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Coverage-guided fuzzing is a widely used and effective solution to find software
vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …

[PDF][PDF] REDQUEEN: Fuzzing with Input-to-State Correspondence.

C Aschermann, S Schumilo, T Blazytko, R Gawlik… - NDSS, 2019 - nyx-fuzz.com
Automated software testing based on fuzzing has experienced a revival in recent years.
Especially feedback-driven fuzzing has become well-known for its ability to efficiently …

Libafl: A framework to build modular and reusable fuzzers

A Fioraldi, DC Maier, D Zhang, D Balzarotti - Proceedings of the 2022 …, 2022 - dl.acm.org
The release of AFL marked an important milestone in the area of software security testing,
revitalizing fuzzing as a major research topic and spurring a large number of research …

[HTML][HTML] Fuzzing: a survey

J Li, B Zhao, C Zhang - Cybersecurity, 2018 - Springer
Security vulnerability is one of the root causes of cyber-security threats. To discover
vulnerabilities and fix them in advance, researchers have proposed several techniques …

Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …