Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Evaluating fuzz testing

G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing techniques …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Collafl: Path sensitive fuzzing

S Gan, C Zhang, X Qin, X Tu, K Li… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Coverage-guided fuzzing is a widely used and effective solution to find software
vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …

[PDF][PDF] REDQUEEN: Fuzzing with Input-to-State Correspondence.

C Aschermann, S Schumilo, T Blazytko, R Gawlik… - NDSS, 2019 - nyx-fuzz.com
Automated software testing based on fuzzing has experienced a revival in recent years.
Especially feedback-driven fuzzing has become well-known for its ability to efficiently …

{MOPT}: Optimized mutation scheduling for fuzzers

C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song… - 28th USENIX Security …, 2019 - usenix.org
Mutation-based fuzzing is one of the most popular vulnerability discovery solutions. Its
performance of generating interesting test cases highly depends on the mutation scheduling …

Smartian: Enhancing smart contract fuzzing with static and dynamic data-flow analyses

J Choi, D Kim, S Kim, G Grieco… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Unlike traditional software, smart contracts have the unique organization in which a
sequence of transactions shares persistent states. Unfortunately, such a characteristic …

Fuzzing: a survey

J Li, B Zhao, C Zhang - Cybersecurity, 2018 - Springer
Security vulnerability is one of the root causes of cyber-security threats. To discover
vulnerabilities and fix them in advance, researchers have proposed several techniques …

Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …

Razzer: Finding kernel race bugs through fuzzing

DR Jeong, K Kim, B Shivakumar… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
A data race in a kernel is an important class of bugs, critically impacting the reliability and
security of the associated system. As a result of a race, the kernel may become …