[PDF][PDF] FuSeBMC: A white-box fuzzer for finding security vulnerabilities in C programs (competition contribution)

KM Alshmrany, RS Menezes, MR Gadelha… - International …, 2021 - library.oapen.org
We describe and evaluate a novel white-box fuzzer for C programs named FuSeBMC, which
combines fuzzing and symbolic execution, and applies Bounded Model Checking (BMC) to …

Exploratory review of hybrid fuzzing for automated vulnerability detection

F Rustamov, J Kim, J Yu, J Yun - IEEE Access, 2021 - ieeexplore.ieee.org
Recently, software testing has become a significant component of information security. The
most reliable technique for automated software testing is a fuzzing tool that feeds programs …

Map2Check: Using Symbolic Execution and Fuzzing: (Competition Contribution)

H Rocha, R Menezes, LC Cordeiro… - … 2020, Held as Part of the …, 2020 - Springer
Map2Check is a software verification tool that combines fuzzing, symbolic execution, and
inductive invariants. It automatically checks safety properties in C programs by adopting …

Joint forces for memory safety checking revisited

M Chalupa, J Strejček, M Vitovská - International Journal on Software …, 2020 - Springer
We present an improved version of the memory safety verification approach implemented in
Symbiotic 5, the winner of the MemSafety category at the Competition on Software …

Finding security vulnerabilities in network protocol implementations

K Alshmrany, L Cordeiro - arXiv preprint arXiv:2001.09592, 2020 - arxiv.org
Implementations of network protocols are often prone to vulnerabilities caused by
developers' mistakes when accessing memory regions and dealing with arithmetic …

Black-Box Cooperative Verification Framework for Finding Software Vulnerabilities in Concurrent Programs

F Aljaafari - 2023 - search.proquest.com
Detecting software vulnerabilities in concurrent programs poses a significant challenge due
to the extensive state-space exploration required, with interleavings growing exponentially …