A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

Coverage-directed differential testing of JVM implementations

Y Chen, T Su, C Sun, Z Su, J Zhao - proceedings of the 37th ACM …, 2016 - dl.acm.org
Java virtual machine (JVM) is a core technology, whose reliability is critical. Testing JVM
implementations requires painstaking effort in designing test classfiles (*. class) along with …

Predoo: precision testing of deep learning operators

X Zhang, N Sun, C Fang, J Liu, J Liu, D Chai… - Proceedings of the 30th …, 2021 - dl.acm.org
Deep learning (DL) techniques attract people from various fields with superior performance
in making progressive breakthroughs. To ensure the quality of DL techniques, researchers …

Recent advances in automatic black-box testing

L Mariani, M Pezze, D Zuddas - Advances in computers, 2015 - Elsevier
Research in black-box testing has produced impressive results in the past 40 years,
addressing many aspects of the problem that span from integration with the development …

PhysCov: physical test coverage for autonomous vehicles

C Hildebrandt, M von Stein, S Elbaum - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Adequately exercising the behaviors of autonomous vehicles is fundamental to their
validation. However, quantifying an autonomous vehicle's testing adequacy is challenging …

HFuzz: Towards automatic fuzzing testing of NB-IoT core network protocols implementations

X Liu, B Cui, J Fu, J Ma - Future Generation Computer Systems, 2020 - Elsevier
Abstract Narrowband Internet of Things (NB-loT) is widely deployed in the cellular network of
operators, yet implementations of its core network protocols are suffering from bugs. Due to …

Metis: file system model checking via versatile input and state exploration

Y Liu, M Adkar, G Holzmann, G Kuenning… - … USENIX Conference on …, 2024 - usenix.org
We present Metis, a model-checking framework designed for versatile, thorough, yet
configurable file system testing in the form of input and state exploration. It uses a …

Improving fuzzing using software complexity metrics

MO Shudrak, VV Zolotarev - … Security and Cryptology-ICISC 2015: 18th …, 2016 - Springer
Vulnerable software represents a tremendous threat to modern information systems.
Vulnerabilities in widespread applications may be used to spread malware, steal money and …

Input and output coverage needed in file system testing

Y Liu, G Ahuja, G Kuenning, S Smolka… - Proceedings of the 15th …, 2023 - dl.acm.org
File systems need testing to discover bugs and to help ensure reliability. Many file system
testing tools are evaluated based on their code coverage. We analyzed recently reported …