The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Tools for reduced precision computation: a survey

S Cherubin, G Agosta - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The use of reduced precision to improve performance metrics such as computation latency
and power consumption is a common practice in the embedded systems field. This practice …

Savior: Towards bug-driven hybrid testing

Y Chen, P Li, J Xu, S Guo, R Zhou… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Hybrid testing combines fuzz testing and concolic execution. It leverages fuzz testing to test
easy-to-reach code regions and uses concolic execution to explore code blocks guarded by …

SoK: Sanitizing for security

D Song, J Lettner, P Rajasekaran, Y Na… - … IEEE Symposium on …, 2019 - ieeexplore.ieee.org
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …

Systematic fuzzing and testing of TLS libraries

J Somorovsky - Proceedings of the 2016 ACM SIGSAC conference on …, 2016 - dl.acm.org
We present TLS-Attacker, an open source framework for evaluating the security of TLS
libraries. TLS-Attacker allows security engineers to create custom TLS message flows and …

Towards optimization-safe systems: Analyzing the impact of undefined behavior

X Wang, N Zeldovich, MF Kaashoek… - Proceedings of the …, 2013 - dl.acm.org
This paper studies an emerging class of software bugs called optimization-unstable code:
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …

Finding bugs in database systems via query partitioning

M Rigger, Z Su - Proceedings of the ACM on Programming Languages, 2020 - dl.acm.org
Logic bugs in Database Management Systems (DBMSs) are bugs that cause an incorrect
result for a given query, for example, by omitting a row that should be fetched. These bugs …

The correctness-security gap in compiler optimization

V D'Silva, M Payer, D Song - 2015 IEEE Security and Privacy …, 2015 - ieeexplore.ieee.org
There is a significant body of work devoted to testing, verifying, and certifying the correctness
of optimizing compilers. The focus of such work is to determine if source code and optimized …

Exposing numerical bugs in deep learning via gradient back-propagation

M Yan, J Chen, X Zhang, L Tan, G Wang… - Proceedings of the 29th …, 2021 - dl.acm.org
Numerical computation is dominant in deep learning (DL) programs. Consequently,
numerical bugs are one of the most prominent kinds of defects in DL programs. Numerical …

Improving integer security for systems with {KINT}

X Wang, H Chen, Z Jia, N Zeldovich… - … USENIX Symposium on …, 2012 - usenix.org
Integer errors have emerged as an important threat to systems security, because they allow
exploits such as buffer overflow and privilege escalation. This paper presents KINT, a tool …