Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Nyx-net: network fuzzing with incremental snapshots

S Schumilo, C Aschermann, A Jemmett… - Proceedings of the …, 2022 - dl.acm.org
Coverage-guided fuzz testing (" fuzzing") has become mainstream and we have observed
lots of progress in this research area recently. However, it is still challenging to efficiently test …

{SGXFuzz}: Efficiently synthesizing nested structures for {SGX} enclave fuzzing

T Cloosters, J Willbold, T Holz, L Davi - 31st USENIX Security …, 2022 - usenix.org
Intel's Software Guard Extensions (SGX) provide a nonintrospectable trusted execution
environment (TEE) to protect security-critical code from a potentially malicious OS. This …

{TCP-Fuzz}: Detecting memory and semantic bugs in {TCP} stacks with fuzzing

YH Zou, JJ Bai, J Zhou, J Tan, C Qin… - 2021 USENIX Annual …, 2021 - usenix.org
TCP stacks provide reliable data transmission in network, and thus they should be correctly
implemented and well tested to ensure reliability and security. However, testing TCP stacks …

V-shuttle: Scalable and semantics-aware hypervisor virtual device fuzzing

G Pan, X Lin, X Zhang, Y Jia, S Ji, C Wu… - Proceedings of the …, 2021 - dl.acm.org
With the wide application and deployment of cloud computing in enterprises, virtualization
developers and security researchers are paying more attention to cloud computing security …

Snowcat: Efficient kernel concurrency testing using a learned coverage predictor

S Gong, D Peng, D Altınbüken, P Fonseca… - Proceedings of the 29th …, 2023 - dl.acm.org
Random-based approaches and heuristics are commonly used in kernel concurrency
testing due to the massive scale of modern kernels and corresponding interleaving space …

Accelerating fuzzing through prefix-guided execution

S Li, Z Su - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
Coverage-guided fuzzing is one of the most effective approaches for discovering software
defects and vulnerabilities. It executes all mutated tests from seed inputs to expose coverage …

[PDF][PDF] Fitm: Binary-only coverage-guided fuzzing for stateful network protocols

D Maier, O Bittner, M Munier… - Workshop on Binary …, 2022 - ndss-symposium.org
Common network protocol fuzzers use complex grammars for fuzzing clients and servers
with a (semi-) correct input for the server. In contrast, feedback-guided fuzzers learn their …

Drifuzz: Harvesting bugs in device drivers from golden seeds

Z Shen, R Roongta, B Dolan-Gavitt - 31st USENIX Security Symposium …, 2022 - usenix.org
Peripheral hardware in modern computers is typically assumed to be secure and not
malicious, and device drivers are implemented in a way that trusts inputs from hardware …

Static detection of unsafe {DMA} accesses in device drivers

JJ Bai, T Li, K Lu, SM Hu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …