Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …

Smart greybox fuzzing

VT Pham, M Böhme, AE Santosa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …

Memlock: Memory usage guided fuzzing

C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu… - Proceedings of the …, 2020 - dl.acm.org
Uncontrolled memory consumption is a kind of critical software security weaknesses. It can
also become a security-critical vulnerability when attackers can take control of the input to …

Toss a fault to your witcher: Applying grey-box coverage-guided mutational fuzzing to detect sql and command injection vulnerabilities

E Trickel, F Pagani, C Zhu, L Dresel… - … IEEE symposium on …, 2023 - ieeexplore.ieee.org
Black-box web application vulnerability scanners attempt to automatically identify
vulnerabilities in web applications without access to the source code. However, they do so …

{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs

H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li… - 29th USENIX Security …, 2020 - usenix.org
Grey-box fuzz testing has revealed thousands of vulnerabilities in real-world software owing
to its lightweight instrumentation, fast coverage feedback, and dynamic adjusting strategies …

[PDF][PDF] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.

Y Wang, X Jia, Y Liu, K Zeng, T Bao, D Wu, P Su - NDSS, 2020 - wcventure.github.io
Coverage-based fuzzing has been actively studied and widely adopted for finding
vulnerabilities in real-world software applications. With coverage information, such as …

Understanding the effectiveness of large language models in detecting security vulnerabilities

A Khare, S Dutta, Z Li, A Solko-Breslin, R Alur… - arXiv preprint arXiv …, 2023 - arxiv.org
Security vulnerabilities in modern software are prevalent and harmful. While automated
vulnerability detection tools have made promising progress, their scalability and applicability …

{PolyFuzz}: Holistic Greybox Fuzzing of {Multi-Language} Systems

W Li, J Ruan, G Yi, L Cheng, X Luo, H Cai - 32nd USENIX Security …, 2023 - usenix.org
While offering many advantages during software process, the practice of using multiple
programming languages in constructing one software system also introduces additional …

MTFuzz: fuzzing with a multi-task neural network

D She, R Krishna, L Yan, S Jana, B Ray - … of the 28th ACM joint meeting …, 2020 - dl.acm.org
Fuzzing is a widely used technique for detecting software bugs and vulnerabilities. Most
popular fuzzers generate new inputs using an evolutionary search to maximize code …

Grey-box concolic testing on binary code

J Choi, J Jang, C Han, SK Cha - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
We present grey-box concolic testing, a novel path-based test case generation method that
combines the best of both white-box and grey-box fuzzing. At a high level, our technique …