Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting

Z Liu, P Qian, J Yang, L Liu, X Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain smart contracts have given rise to a variety of interesting and compelling
applications and emerged as a revolutionary force for the Internet. Smart contracts from …

Memlock: Memory usage guided fuzzing

C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu… - Proceedings of the …, 2020 - dl.acm.org
Uncontrolled memory consumption is a kind of critical software security weaknesses. It can
also become a security-critical vulnerability when attackers can take control of the input to …

Healer: Relation learning guided kernel fuzzing

H Sun, Y Shen, C Wang, J Liu, Y Jiang… - Proceedings of the …, 2021 - dl.acm.org
Modern operating system kernels are too complex to be free of bugs. Fuzzing is a promising
approach for vulnerability detection and has been applied to kernel testing. However …

Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects

S Lakshminarayana, A Praseed… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) is one of the most promising new millennial technologies, having
numerous applications in our surrounding environment. The fundamental goal of an IoT …

Testing the limits: Unusual text inputs generation for mobile app crash detection with large language model

Z Liu, C Chen, J Wang, M Chen, B Wu, Z Tian… - Proceedings of the …, 2024 - dl.acm.org
Mobile applications have become a ubiquitous part of our daily life, providing users with
access to various services and utilities. Text input, as an important interaction channel …

Smart contract vulnerability detection technique: A survey

P Qian, Z Liu, Q He, B Huang, D Tian… - arXiv preprint arXiv …, 2022 - arxiv.org
Smart contract, one of the most successful applications of blockchain, is taking the world by
storm, playing an essential role in the blockchain ecosystem. However, frequent smart …