Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis

W Zheng, P Deng, K Gui, X Wu - Information and Software Technology, 2023 - Elsevier
Context: Zero-day vulnerabilities are highly destructive and sudden. However, traditional
static and dynamic testing methods cannot efficiently detect them. Objective: In this paper, a …

Memlock: Memory usage guided fuzzing

C Wen, H Wang, Y Li, S Qin, Y Liu, Z Xu… - Proceedings of the …, 2020 - dl.acm.org
Uncontrolled memory consumption is a kind of critical software security weaknesses. It can
also become a security-critical vulnerability when attackers can take control of the input to …

{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs

H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li… - 29th USENIX Security …, 2020 - usenix.org
Grey-box fuzz testing has revealed thousands of vulnerabilities in real-world software owing
to its lightweight instrumentation, fast coverage feedback, and dynamic adjusting strategies …

[PDF][PDF] Reinforcement learning-based hierarchical seed scheduling for greybox fuzzing

J Wang, C Song, H Yin - 2021 - escholarship.org
Coverage metrics play an essential role in greybox fuzzing. Recent work has shown that fine-
grained coverage metrics could allow a fuzzer to detect bugs that cannot be covered by …

{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures

Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu… - 29th USENIX Security …, 2020 - usenix.org
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …

Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing

S Cao, B He, X Sun, Y Ouyang, C Zhang… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …

Binary-level directed fuzzing for {use-after-free} vulnerabilities

MD Nguyen, S Bardin, R Bonichon, R Groz… - … on Research in Attacks …, 2020 - usenix.org
Directed fuzzing focuses on automatically testing specific parts of the code by taking
advantage of additional information such as (partial) bug stack trace, patches or risky …

[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection

ZM Jiang, JJ Bai, K Lu, SM Hu - Network and Distributed Systems …, 2022 - par.nsf.gov
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …