A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

Fairfuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage

C Lemieux, K Sen - Proceedings of the 33rd ACM/IEEE international …, 2018 - dl.acm.org
In recent years, fuzz testing has proven itself to be one of the most effective techniques for
finding correctness bugs and security vulnerabilities in practice. One particular fuzz testing …

[PDF][PDF] Driller: Augmenting fuzzing through selective symbolic execution.

N Stephens, J Grosen, C Salls, A Dutcher, R Wang… - NDSS, 2016 - yancomm.net
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …

T-Fuzz: fuzzing by program transformation

H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Fuzzing is a simple yet effective approach to discover software bugs utilizing randomly
generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …

Sereum: Protecting existing smart contracts against re-entrancy attacks

M Rodler, W Li, GO Karame, L Davi - arXiv preprint arXiv:1812.05934, 2018 - arxiv.org
Recently, a number of existing blockchain systems have witnessed major bugs and
vulnerabilities within smart contracts. Although the literature features a number of proposals …

Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

[PDF][PDF] Intellidroid: a targeted input generator for the dynamic analysis of android malware.

MY Wong, D Lie - NDSS, 2016 - ndss-symposium.org
While dynamic malware analysis methods generally provide better precision than purely
static methods, they have the key drawback that they can only detect malicious behavior if it …