A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Fuzzers for stateful systems: Survey and Research Directions
Fuzzing is a very effective testing methodology to find bugs. In a nutshell, a fuzzer sends
many slightly malformed messages to the software under test, hoping for crashes or …
many slightly malformed messages to the software under test, hoping for crashes or …
[PDF][PDF] Large language model guided protocol fuzzing
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …
specification of the protocol? Facing the internet, protocol implementations are particularly …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Nsfuzz: Towards efficient and state-aware network service fuzzing
As an essential component responsible for communication, network services are security
critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular …
critical, thus, it is vital to find their vulnerabilities. Fuzzing is currently one of the most popular …
Testing database engines via query plan guidance
Database systems are widely used to store and query data. Test oracles have been
proposed to find logic bugs in such systems, that is, bugs that cause the database system to …
proposed to find logic bugs in such systems, that is, bugs that cause the database system to …
Snapfuzz: high-throughput fuzzing of network applications
A Andronidis, C Cadar - Proceedings of the 31st ACM SIGSOFT …, 2022 - dl.acm.org
In recent years, fuzz testing has benefited from increased computational power and
important algorithmic advances, leading to systems that have discovered many critical bugs …
important algorithmic advances, leading to systems that have discovered many critical bugs …
Bleem: Packet sequence oriented fuzzing for protocol implementations
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …
in the implementations can easily render devices vulnerable to adversaries. Therefore …
Evaluating and improving hybrid fuzzing
To date, various hybrid fuzzers have been proposed for maximal program vulnerability
exposure by integrating the power of fuzzing strategies and concolic executors. While the …
exposure by integrating the power of fuzzing strategies and concolic executors. While the …
Logos: Log guided fuzzing for protocol implementations
Network protocols are extensively used in a variety of network devices, making the security
of their implementations crucial. Protocol fuzzing has shown promise in uncovering …
of their implementations crucial. Protocol fuzzing has shown promise in uncovering …