The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

Unleashing mayhem on binary code

SK Cha, T Avgerinos, A Rebert… - 2012 IEEE Symposium …, 2012 - ieeexplore.ieee.org
In this paper we present Mayhem, a new system for automatically finding exploitable bugs in
binary (ie, executable) programs. Every bug reported by Mayhem is accompanied by a …

[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.

MY Wong, D Lie - NDSS, 2016 - ndss-symposium.org
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities

J Caballero, G Grieco, M Marron, A Nappa - Proceedings of the 2012 …, 2012 - dl.acm.org
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web
browsers. Use-after-free (and double-free) vulnerabilities are caused by a program …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer

R Verdult, FD Garcia, B Ege - Supplement to the Proceedings of 22nd …, 2015 - usenix.org
The Megamos Crypto transponder is used in one of the most widely deployed electronic
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …

Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping

D Xu, J Ming, D Wu - 2017 IEEE Symposium on Security and …, 2017 - ieeexplore.ieee.org
Cryptographic functions have been commonly abused by malware developers to hide
malicious behaviors, disguise destructive payloads, and bypass network-based firewalls …