PDFuzzerGen: Policy‐Driven Black‐Box Fuzzer Generation for Smart Devices

Y Cheng, W Fan, W Huang, G Yu, Y Han… - Security and …, 2022 - Wiley Online Library
Black‐box fuzzing is a testing technique to find both known and unknown vulnerabilities in
software. When applying black‐box fuzzing to smart devices, the main idea is to take a smart …

LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices

H Liu, S Gan, C Zhang, Z Gao, H Zhang… - 2024 IEEE Symposium …, 2024 - computer.org
Fuzzing is a popular solution to finding vulnerabilities in software including IoT firmware.
However, due to the challenges of emulating or rehosting firmware, some IoT devices (eg …

[HTML][HTML] Firmhunter: State-aware and introspection-driven grey-box fuzzing towards iot firmware

Q Yin, X Zhou, H Zhang - Applied Sciences, 2021 - mdpi.com
IoT devices are exponentially increasing in all aspects of our lives. Via the web interfaces of
IoT devices, attackers can control IoT devices by exploiting their vulnerabilities. In order to …

[HTML][HTML] Optimizing IoT Web Fuzzing by Firmware Infomation Mining

Y Gao, X Zhou, W Xie, B Wang, E Wang, Z Wang - Applied Sciences, 2022 - mdpi.com
IoT web fuzzing is an effective way to detect security flaws in IoT devices. However, without
enough information of the tested targets, IoT web fuzzing is often blind and inefficient. In this …

[HTML][HTML] EWVHunter: grey-box fuzzing with knowledge guide on embedded web front-ends

E Wang, B Wang, W Xie, Z Wang, Z Luo, T Yue - Applied Sciences, 2020 - mdpi.com
At present, embedded devices have become a part of people's lives, so detecting security
vulnerabilities contained in devices becomes imperative. There are three challenges in …

Suzzer: A vulnerability-guided fuzzer based on deep learning

Y Zhao, Y Li, T Yang, H Xie - International Conference on Information …, 2020 - Springer
Fuzzing is a simple and effective way to find software bugs. Most state-of-the-art fuzzers
focus on improving code coverage to enhance the possibility of causing crashes. However …

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Y Zheng, Y Li, C Zhang, H Zhu, Y Liu… - Proceedings of the 31st …, 2022 - dl.acm.org
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …

[HTML][HTML] MSLFuzzer: black-box fuzzing of SOHO router devices via message segment list inference

Y Cheng, W Fan, W Huang, J Yang, G Yu, W Liu - Cybersecurity, 2023 - Springer
The popularity of small office and home office routers has brought convenience, but it also
caused many security issues due to vulnerabilities. Black-box fuzzing through network …

On designing an efficient distributed black-box fuzzing system for mobile devices

WH Lee, M Srirangam Ramanujam… - Proceedings of the 10th …, 2015 - dl.acm.org
Security researchers who jailbreak iOS devices have usually crowdsourced for system level
vulnerabilities [1] for iOS. However, their success has depended on whether a particular …

StFuzzer: Contribution‐Aware Coverage‐Guided Fuzzing for Smart Devices

J Yang, X Zhang, H Lu, M Shafiq… - Security and …, 2021 - Wiley Online Library
The root cause of the insecurity for smart devices is the potential vulnerabilities in smart
devices. There are many approaches to find the potential bugs in smart devices. Fuzzing is …