A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies

A Qasem, P Shirani, M Debbabi, L Wang… - ACM Computing …, 2021 - dl.acm.org
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Skyfire: Data-driven seed generation for fuzzing

J Wang, B Chen, L Wei, Y Liu - 2017 IEEE Symposium on …, 2017 - ieeexplore.ieee.org
Programs that take highly-structured files as inputs normally process inputs in stages: syntax
parsing, semantic checking, and application execution. Deep bugs are often hidden in the …

[PDF][PDF] NAUTILUS: Fishing for deep bugs with grammars.

C Aschermann, T Frassetto, T Holz, P Jauernig… - NDSS, 2019 - react-h2020.eu
Fuzz testing is a well-known method for efficiently identifying bugs in programs.
Unfortunately, when programs that require highly-structured inputs such as interpreters are …

Steelix: program-state based binary fuzzing

Y Li, B Chen, M Chandramohan, SW Lin… - Proceedings of the 2017 …, 2017 - dl.acm.org
Coverage-based fuzzing is one of the most effective techniques to find vulnerabilities, bugs
or crashes. However, existing techniques suffer from the difficulty in exercising the paths that …

Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …

[PDF][PDF] Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.

Y Shoshitaishvili, R Wang, C Hauser, C Kruegel… - NDSS, 2015 - ndss-symposium.org
Embedded devices have become ubiquitous, and they are used in a range of privacy-
sensitive and security-critical applications. Most of these devices run proprietary software …

Unleashing mayhem on binary code

SK Cha, T Avgerinos, A Rebert… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
In this paper we present Mayhem, a new system for automatically finding exploitable bugs in
binary (ie, executable) programs. Every bug reported by Mayhem is accompanied by a …

Sailfish: Vetting smart contract state-inconsistency bugs in seconds

P Bose, D Das, Y Chen, Y Feng… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
This paper presents SAILFISH, a scalable system for automatically finding state-
inconsistency bugs in smart contracts. To make the analysis tractable, we introduce a hybrid …