Effectively generating vulnerable transaction sequences in smart contracts with reinforcement learning-guided fuzzing

J Su, HN Dai, L Zhao, Z Zheng, X Luo - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
As computer programs run on top of blockchain, smart contracts have proliferated a myriad
of decentralized applications while bringing security vulnerabilities, which may cause huge …

A comprehensive review of learning-based fuzz testing techniques

H Cheng, D Li, M Zhao, H Li… - 2024 10th international …, 2024 - ieeexplore.ieee.org
Fuzz testing has emerged as a dominant approach for identifying vulnerabilities, significantly
improving software development and testing. Yet, traditional fuzz testing often grapples with …

A deep convolution generative adversarial networks based fuzzing framework for industry control protocols

W Lv, J Xiong, J Shi, Y Huang, S Qin - Journal of Intelligent Manufacturing, 2021 - Springer
A growing awareness is brought that the safety and security of industrial control systems
cannot be dealt with in isolation, and the safety and security of industrial control protocols …

BertRLFuzzer: A BERT and reinforcement learning based fuzzer

P Jha, J Scott, JS Ganeshna, M Singh… - arXiv preprint arXiv …, 2023 - arxiv.org
We present a novel tool BertRLFuzzer, a BERT and Reinforcement Learning (RL) based
fuzzer aimed at finding security vulnerabilities for Web applications. BertRLFuzzer works as …

ALPHAPROG: reinforcement generation of valid programs for compiler fuzzing

X Li, X Liu, L Chen, R Prajapati, D Wu - Proceedings of the AAAI …, 2022 - ojs.aaai.org
Fuzzing is a widely-used testing technique to assure software robustness. However,
automatic generation of high-quality test suites is challenging, especially for software that …

ICPFuzzer: proprietary communication protocol fuzzing by using machine learning and feedback strategies

PY Lin, CW Tien, TC Huang, CW Tien - Cybersecurity, 2021 - Springer
The fuzzing test is able to discover various vulnerabilities and has more chances to hit the
zero-day targets. And ICS (Industrial control system) is currently facing huge security threats …

Reinforcement Learning's Contribution to the Cyber Security of Distributed Systems: Systematization of Knowledge

C Feltus - International Journal of Distributed Artificial Intelligence …, 2020 - igi-global.com
Reinforcement learning (RL) is a machine learning paradigm, like supervised or
unsupervised learning, which learns the best actions an agent needs to perform to maximize …

Towards a testing tool that learns to test

O Rodriguez-Valdes - 2021 IEEE/ACM 43rd International …, 2021 - ieeexplore.ieee.org
We will study the application of Reinforcement Learning techniques in automated GUI
testing. Using the scriptless GUI testing tool TESTAR as a vehicle, we will focus our research …

Cyber Diversity Index for Autonomous Anomaly Management

M Donevski - 2020 - researchoutput.csu.edu.au
Abstract To effectively use Machine Learning (ML) in cybersecurity, automation is required.
However, there cannot be true Intelligent Automation in cybersecurity if anomalies are …