Nsfuzz: Towards efficient and state-aware network service fuzzing

S Qin, F Hu, Z Ma, B Zhao, T Yin, C Zhang - ACM Transactions on …, 2023 - dl.acm.org
As an essential component responsible for communication, network services are security
critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular …

A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

Bleem: Packet sequence oriented fuzzing for protocol implementations

Z Luo, J Yu, F Zuo, J Liu, Y Jiang, T Chen… - 32nd USENIX Security …, 2023 - usenix.org
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …

Tyr: Finding consensus failure bugs in blockchain system with behaviour divergent model

Y Chen, F Ma, Y Zhou, Y Jiang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Blockchain is a decentralized distributed system on which a large number of financial
applications have been deployed. The consensus process in it plays an important role …

{TCP-Fuzz}: Detecting memory and semantic bugs in {TCP} stacks with fuzzing

YH Zou, JJ Bai, J Zhou, J Tan, C Qin… - 2021 USENIX Annual …, 2021 - usenix.org
TCP stacks provide reliable data transmission in network, and thus they should be correctly
implemented and well tested to ensure reliability and security. However, testing TCP stacks …

A survey on fuzz testing technologies for industrial control protocols

X Wei, Z Yan, X Liang - Journal of Network and Computer Applications, 2024 - Elsevier
The development of the industrial Internet of Things enables industrial control systems to
become inter-networked and inter-connected, making them intelligent with high productivity …

CLFuzz: Vulnerability detection of cryptographic algorithm implementation via semantic-aware fuzzing

Y Zhou, F Ma, Y Chen, M Ren, Y Jiang - ACM Transactions on Software …, 2023 - dl.acm.org
Cryptography is a core component of many security applications, and flaws hidden in its
implementation will affect the functional integrity or, more severely, pose threats to data …

SNPSFuzzer: A fast greybox fuzzer for stateful network protocols using snapshots

J Li, S Li, G Sun, T Chen, H Yu - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Greybox fuzzing has been widely used in stateless programs and has achieved great
success. However, most state-of-the-art greybox fuzzers have slow speed and shallow state …

[PDF][PDF] LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols.

F Ma, Y Chen, M Ren, Y Zhou, Y Jiang, T Chen, H Li… - NDSS, 2023 - wingtecher.com
Blockchain consensus protocols are responsible for coordinating the nodes to make
agreements on the transaction results. Their implementation bugs, including memory-related …

Ics3fuzzer: A framework for discovering protocol implementation bugs in ics supervisory software by fuzzing

D Fang, Z Song, L Guan, P Liu, A Peng… - Proceedings of the 37th …, 2021 - dl.acm.org
The supervisory software is widely used in industrial control systems (ICSs) to manage field
devices such as PLC controllers. Once compromised, it could be misused to control or …