Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems

M Eceiza, JL Flores, M Iturbe - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …

{EnFuzz}: Ensemble fuzzing with seed synchronization among diverse fuzzers

Y Chen, Y Jiang, F Ma, J Liang, M Wang… - 28th USENIX Security …, 2019 - usenix.org
Fuzzing is widely used for vulnerability detection. There are various kinds of fuzzers with
different fuzzing strategies, and most of them perform well on their targets. However, in …

[PDF][PDF] Sok: The progress, challenges, and perspectives of directed greybox fuzzing

P Wang, X Zhou, K Lu, T Yue, Y Liu - arXiv preprint arXiv …, 2020 - szu-se.github.io
Greybox fuzzing has been the most scalable and practical approach to software testing.
Most greybox fuzzing tools are coverage guided as code coverage is strongly correlated …

Healer: Relation learning guided kernel fuzzing

H Sun, Y Shen, C Wang, J Liu, Y Jiang… - Proceedings of the …, 2021 - dl.acm.org
Modern operating system kernels are too complex to be free of bugs. Fuzzing is a promising
approach for vulnerability detection and has been applied to kernel testing. However …

[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection

ZM Jiang, JJ Bai, K Lu, SM Hu - Network and Distributed Systems …, 2022 - par.nsf.gov
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …

Pied-piper: Revealing the backdoor threats in ethereum erc token contracts

F Ma, M Ren, L Ouyang, Y Chen, J Zhu… - ACM Transactions on …, 2023 - dl.acm.org
With the development of decentralized networks, smart contracts, especially those for ERC
tokens, are attracting more and more Dapp users to implement their applications. There are …

Evmfuzzer: detect evm vulnerabilities via fuzz testing

Y Fu, M Ren, F Ma, H Shi, X Yang, Y Jiang… - Proceedings of the …, 2019 - dl.acm.org
Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its
vulnerabilities may lead to serious problems to the Ethereum ecology. With lots of …

[PDF][PDF] EMS: History-Driven Mutation for Coverage-based Fuzzing.

C Lyu, S Ji, X Zhang, H Liang, B Zhao, K Lu, R Beyah - NDSS, 2022 - ndss-symposium.org
Mutation-based fuzzing is one of the most popular approaches to discover vulnerabilities in
a program. To alleviate the inefficiency of mutation-based fuzzing incurred by high …

Griffin: Grammar-free DBMS fuzzing

J Fu, J Liang, Z Wu, M Wang, Y Jiang - Proceedings of the 37th IEEE …, 2022 - dl.acm.org
Fuzzing is a promising approach to DBMS testing. One crucial component in DBMS fuzzing
is grammar: since DBMSs enforce strict validation on inputs, a grammar improves fuzzing …

Industry practice of coverage-guided enterprise-level DBMS fuzzing

M Wang, Z Wu, X Xu, J Liang, C Zhou… - 2021 IEEE/ACM …, 2021 - ieeexplore.ieee.org
As an infrastructure for data persistence and analysis, Database Management Systems
(DBMSs) are the cornerstones of modern enterprise software. To improve their correctness …