Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Smartian: Enhancing smart contract fuzzing with static and dynamic data-flow analyses

J Choi, D Kim, S Kim, G Grieco… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Unlike traditional software, smart contracts have the unique organization in which a
sequence of transactions shares persistent states. Unfortunately, such a characteristic …

On the reliability of coverage-based fuzzer benchmarking

M Böhme, L Szekeres, J Metzman - Proceedings of the 44th International …, 2022 - dl.acm.org
Given a program where none of our fuzzers finds any bugs, how do we know which fuzzer is
better? In practice, we often look to code coverage as a proxy measure of fuzzer …

Stateful greybox fuzzing

J Ba, M Böhme, Z Mirzamomen… - 31st USENIX Security …, 2022 - usenix.org
Many protocol implementations are reactive systems, where the protocol process is in
continuous interaction with other processes and the environment. If a bug can be exposed …

Seed selection for successful fuzzing

A Herrera, H Gunadi, S Magrath, M Norrish… - Proceedings of the 30th …, 2021 - dl.acm.org
Mutation-based greybox fuzzing---unquestionably the most widely-used fuzzing technique---
relies on a set of non-crashing seed inputs (a corpus) to bootstrap the bug-finding process …

Effective seed scheduling for fuzzing with graph centrality analysis

D She, A Shah, S Jana - 2022 IEEE Symposium on Security …, 2022 - ieeexplore.ieee.org
Seed scheduling, the order in which seeds are selected, can greatly affect the performance
of a fuzzer. Existing approaches schedule seeds based on their historical mutation data, but …

Pata: Fuzzing with path aware taint analysis

J Liang, M Wang, C Zhou, Z Wu, Y Jiang… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Taint analysis assists fuzzers in solving complex fuzzing constraints by inferring the
influencing input bytes. Execution paths in real-world programs often reach loops, where …

[PDF][PDF] Reinforcement learning-based hierarchical seed scheduling for greybox fuzzing

J Wang, C Song, H Yin - 2021 - escholarship.org
Coverage metrics play an essential role in greybox fuzzing. Recent work has shown that fine-
grained coverage metrics could allow a fuzzer to detect bugs that cannot be covered by …