Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

Directed greybox fuzzing

M Böhme, VT Pham, MD Nguyen… - Proceedings of the 2017 …, 2017 - dl.acm.org
Existing Greybox Fuzzers (GF) cannot be effectively directed, for instance, towards
problematic changes or patches, towards critical system calls or dangerous locations, or …

Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection

S Cao, X Sun, L Bo, Y Wei, B Li - Information and Software Technology, 2021 - Elsevier
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …

Coverage-based greybox fuzzing as markov chain

M Böhme, VT Pham, A Roychoudhury - Proceedings of the 2016 ACM …, 2016 - dl.acm.org
Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no
program analysis. A new test is generated by slightly mutating a seed input. If the test …

[PDF][PDF] VUzzer: Application-aware evolutionary fuzzing.

S Rawat, V Jain, A Kumar, L Cojocar, C Giuffrida… - NDSS, 2017 - research.vu.nl
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …

Modeling and discovering vulnerabilities with code property graphs

F Yamaguchi, N Golde, D Arp… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …

Harvey: A greybox fuzzer for smart contracts

V Wüstholz, M Christakis - Proceedings of the 28th ACM Joint Meeting …, 2020 - dl.acm.org
We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs
managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation …

[图书][B] Internet-of-things (IoT) systems: architectures, algorithms, methodologies

D Serpanos, M Wolf - 2017 - Springer
The Internet of Things is the evolutionary step of the Internet that creates a worldwide
infrastructure interconnecting machines and humans. As the Internet became public in the …

[PDF][PDF] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.

Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su - NDSS, 2020 - wcventure.github.io
Coverage-based fuzzing has been actively studied and widely adopted for finding
vulnerabilities in real-world software applications. With coverage information, such as …