G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software. Recently, researchers have devoted significant effort to devising new fuzzing techniques …
Among the many software testing techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
S Gan, C Zhang, X Qin, X Tu, K Li… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Coverage-guided fuzzing is a widely used and effective solution to find software vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …
Automated software testing based on fuzzing has experienced a revival in recent years. Especially feedback-driven fuzzing has become well-known for its ability to efficiently …
C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song… - 28th USENIX Security …, 2019 - usenix.org
Mutation-based fuzzing is one of the most popular vulnerability discovery solutions. Its performance of generating interesting test cases highly depends on the mutation scheduling …
J Choi, D Kim, S Kim, G Grieco… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Unlike traditional software, smart contracts have the unique organization in which a sequence of transactions shares persistent states. Unfortunately, such a characteristic …
J Li, B Zhao, C Zhang - Cybersecurity, 2018 - Springer
Security vulnerability is one of the root causes of cyber-security threats. To discover vulnerabilities and fix them in advance, researchers have proposed several techniques …
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …
A data race in a kernel is an important class of bugs, critically impacting the reliability and security of the associated system. As a result of a race, the kernel may become …