Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting

Z Liu, P Qian, J Yang, L Liu, X Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain smart contracts have given rise to a variety of interesting and compelling
applications and emerged as a revolutionary force for the Internet. Smart contracts from …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Difuzzrtl: Differential fuzz testing to find cpu bugs

J Hur, S Song, D Kwon, E Baek, J Kim… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Security bugs in CPUs have critical security impacts to all the computation related hardware
and software components as it is the core of the computation. In spite of the fact that …

Krace: Data race fuzzing for kernel file systems

M Xu, S Kashyap, H Zhao, T Kim - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Data races occur when two threads fail to use proper synchronization when accessing
shared data. In kernel file systems, which are highly concurrent by design, data races are …

[PDF][PDF] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.

Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su - NDSS, 2020 - wcventure.github.io
Coverage-based fuzzing has been actively studied and widely adopted for finding
vulnerabilities in real-world software applications. With coverage information, such as …

Where does it go? refining indirect-call targets with multi-layer type analysis

K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …

Finding semantic bugs in file systems with an extensible fuzzing framework

S Kim, M Xu, S Kashyap, J Yoon, W Xu… - Proceedings of the 27th …, 2019 - dl.acm.org
File systems are too large to be bug free. Although handwritten test suites have been widely
used to stress file systems, they can hardly keep up with the rapid increase in file system …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …