A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

A systematic literature review of android malware detection using static analysis

Y Pan, X Ge, C Fang, Y Fan - IEEE Access, 2020 - ieeexplore.ieee.org
Android malware has been in an increasing trend in recent years due to the pervasiveness
of Android operating system. Android malware is installed and run on the smartphones …

{AFL++}: Combining incremental steps of fuzzing research

A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX Workshop on …, 2020 - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …

Manticore: A user-friendly symbolic execution framework for binaries and smart contracts

M Mossberg, F Manzano, E Hennenfent… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
An effective way to maximize code coverage in software tests is through dynamic symbolic
execution-a technique that uses constraint solving to systematically explore a program's …

Angora: Efficient fuzzing by principled search

P Chen, H Chen - 2018 IEEE Symposium on Security and …, 2018 - ieeexplore.ieee.org
Fuzzing is a popular technique for finding software bugs. However, the performance of the
state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution …

{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing

I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …

Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution

G Chen, S Chen, Y Xiao, Y Zhang… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …

T-Fuzz: fuzzing by program transformation

H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Fuzzing is a simple yet effective approach to discover software bugs utilizing randomly
generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …

Magma: A ground-truth fuzzing benchmark

A Hazimeh, A Herrera, M Payer - … of the ACM on Measurement and …, 2020 - dl.acm.org
High scalability and low running costs have made fuzz testing the de facto standard for
discovering software bugs. Fuzzing techniques are constantly being improved in a race to …

Steelix: program-state based binary fuzzing

Y Li, B Chen, M Chandramohan, SW Lin… - Proceedings of the 2017 …, 2017 - dl.acm.org
Coverage-based fuzzing is one of the most effective techniques to find vulnerabilities, bugs
or crashes. However, existing techniques suffer from the difficulty in exercising the paths that …