Profuzzbench: A benchmark for stateful protocol fuzzing

R Natella, VT Pham - Proceedings of the 30th ACM SIGSOFT …, 2021 - dl.acm.org
We present a new benchmark (ProFuzzBench) for stateful fuzzing of network protocols. The
benchmark includes a suite of representative open-source network servers for popular …

{TCP-Fuzz}: Detecting memory and semantic bugs in {TCP} stacks with fuzzing

YH Zou, JJ Bai, J Zhou, J Tan, C Qin… - 2021 USENIX Annual …, 2021 - usenix.org
TCP stacks provide reliable data transmission in network, and thus they should be correctly
implemented and well tested to ensure reliability and security. However, testing TCP stacks …

[PDF][PDF] ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing

Q Zhang, X Bai, X Li, H Duan, Q Li, Z Li - Proceedings of the 33rd …, 2023 - usenix.org
Abstract Domain Name System (DNS) is a critical component of the Internet. DNS resolvers,
which act as the cache between DNS clients and DNS nameservers, are the central piece of …

Differential testing of certificate validation in SSL/TLS implementations: An RFC-guided approach

C Tian, C Chen, Z Duan, L Zhao - ACM Transactions on Software …, 2019 - dl.acm.org
Certificate validation in Secure Sockets Layer or Transport Layer Security protocol
(SSL/TLS) is critical to Internet security. Thus, it is significant to check whether certificate …

On the complexity of the Web's PKI: Evaluating certificate validation of mobile browsers

M Luo, B Feng, L Lu, E Kirda… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Digital certificates are frequently used to secure communications between users and web
servers. Critical to the Web's PKI is the secure validation of digital certificates. Nonetheless …

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations

X Liu, B Cui, J Fu, J Ma - Future Generation Computer Systems, 2020 - Elsevier
Abstract Narrowband Internet of Things (NB-loT) is widely deployed in the cellular network of
operators, yet implementations of its core network protocols are suffering from bugs. Due to …

Testing the population administration website application using the black box testing boundary value analysis method

GW Sasmito, M Nishom - 2020 IEEE Conference on Open …, 2020 - ieeexplore.ieee.org
The population administration website application is a computer platform that makes it easy
for the government to integrate population data collected by the Department of Population …

Model‐Based Grey‐Box Fuzzing of Network Protocols

Y Pan, W Lin, L Jiao, Y Zhu - Security and Communication …, 2022 - Wiley Online Library
The widely used network protocols play a crucial role in various systems. However, the
protocol vulnerabilities caused by the design of the network protocol or its implementation by …

Testing TLS using planning-based combinatorial methods and execution framework

DE Simos, J Bozic, B Garn, M Leithner, F Duan… - Software quality …, 2019 - Springer
The TLS protocol is the standard for secure Internet communication between two parties.
Unfortunately, there have been recently successful attacks like DROWN, ROBOT, or …

Security aspects of smart meter infrastructures

I Rigoev, A Sikora - Smart Meters: Artificial Intelligence to Support …, 2023 - Springer
One of the most important questions about smart metering systems for the end users is their
data privacy and security. Indeed, smart metering systems provide a lot of advantages for …