A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Demystify the fuzzing methods: A comprehensive survey
S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …
structures; in such cases, vulnerabilities in the software become inevitable. The …
A survey on IoT intrusion detection: Federated learning, game theory, social psychology, and explainable AI as future directions
In the past several years, the world has witnessed an acute surge in the production and
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
usage of smart devices which are referred to as the Internet of Things (IoT). These devices …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Pre-trained model-based automated software vulnerability repair: How far are we?
Various approaches are proposed to help under-resourced security researchers to detect
and analyze software vulnerabilities. It is still incredibly time-consuming and labor-intensive …
and analyze software vulnerabilities. It is still incredibly time-consuming and labor-intensive …
From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter {IoT} Devices
Matter is an IoT connectivity standard backed by over two hundred companies. Since the
release of its specification in October 2022, numerous IoT devices have become Matter …
release of its specification in October 2022, numerous IoT devices have become Matter …
{HyPFuzz}:{Formal-Assisted} Processor Fuzzing
Recent research has shown that hardware fuzzers can effectively detect security
vulnerabilities in modern processors. However, existing hardware fuzzers do not fuzz well …
vulnerabilities in modern processors. However, existing hardware fuzzers do not fuzz well …
WaVe: a verifiably secure WebAssembly sandboxing runtime
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …
benefits of hardwarebased memory protection without requiring operating system …
Fuzzers for stateful systems: Survey and Research Directions
Fuzzing is a very effective testing methodology to find bugs. In a nutshell, a fuzzer sends
many slightly malformed messages to the software under test, hoping for crashes or …
many slightly malformed messages to the software under test, hoping for crashes or …