Fuzzing the internet of things: A review on the techniques and challenges for efficient vulnerability discovery in embedded systems
With a growing number of embedded devices that create, transform, and send data
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
autonomously at its core, the Internet of Things (IoT) is a reality in different sectors, such as …
{EnFuzz}: Ensemble fuzzing with seed synchronization among diverse fuzzers
Fuzzing is widely used for vulnerability detection. There are various kinds of fuzzers with
different fuzzing strategies, and most of them perform well on their targets. However, in …
different fuzzing strategies, and most of them perform well on their targets. However, in …
[PDF][PDF] Sok: The progress, challenges, and perspectives of directed greybox fuzzing
Greybox fuzzing has been the most scalable and practical approach to software testing.
Most greybox fuzzing tools are coverage guided as code coverage is strongly correlated …
Most greybox fuzzing tools are coverage guided as code coverage is strongly correlated …
Healer: Relation learning guided kernel fuzzing
Modern operating system kernels are too complex to be free of bugs. Fuzzing is a promising
approach for vulnerability detection and has been applied to kernel testing. However …
approach for vulnerability detection and has been applied to kernel testing. However …
[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …
for concurrency problems like data races, several recent concurrency fuzzing approaches …
Pied-piper: Revealing the backdoor threats in ethereum erc token contracts
With the development of decentralized networks, smart contracts, especially those for ERC
tokens, are attracting more and more Dapp users to implement their applications. There are …
tokens, are attracting more and more Dapp users to implement their applications. There are …
Evmfuzzer: detect evm vulnerabilities via fuzz testing
Ethereum Virtual Machine (EVM) is the run-time environment for smart contracts and its
vulnerabilities may lead to serious problems to the Ethereum ecology. With lots of …
vulnerabilities may lead to serious problems to the Ethereum ecology. With lots of …
[PDF][PDF] EMS: History-Driven Mutation for Coverage-based Fuzzing.
Mutation-based fuzzing is one of the most popular approaches to discover vulnerabilities in
a program. To alleviate the inefficiency of mutation-based fuzzing incurred by high …
a program. To alleviate the inefficiency of mutation-based fuzzing incurred by high …
Griffin: Grammar-free DBMS fuzzing
Fuzzing is a promising approach to DBMS testing. One crucial component in DBMS fuzzing
is grammar: since DBMSs enforce strict validation on inputs, a grammar improves fuzzing …
is grammar: since DBMSs enforce strict validation on inputs, a grammar improves fuzzing …
Industry practice of coverage-guided enterprise-level DBMS fuzzing
As an infrastructure for data persistence and analysis, Database Management Systems
(DBMSs) are the cornerstones of modern enterprise software. To improve their correctness …
(DBMSs) are the cornerstones of modern enterprise software. To improve their correctness …