Superion: Grammar-aware greybox fuzzing
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …
{ParmeSan}: Sanitizer-guided greybox fuzzing
One of the key questions when fuzzing is where to look for vulnerabilities. Coverage-guided
fuzzers indiscriminately optimize for covering as much code as possible given that bug …
fuzzers indiscriminately optimize for covering as much code as possible given that bug …
Learning program semantics with code representations: An empirical study
Program semantics learning is the core and fundamental for various code intelligent tasks
eg, vulnerability detection, clone detection. A considerable amount of existing works …
eg, vulnerability detection, clone detection. A considerable amount of existing works …
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
Existing greybox fuzzers mainly utilize program coverage as the goal to guide the fuzzing
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …
Sofi: Reflection-augmented fuzzing for javascript engines
JavaScript engines have been shown prone to security vulnerabilities, which can lead to
serious consequences due to their popularity. Fuzzing is an effective testing technique to …
serious consequences due to their popularity. Fuzzing is an effective testing technique to …
{APICraft}: Fuzz driver generation for closed-source {SDK} libraries
Fuzz drivers are needed for fuzzing libraries. A fuzz driver is a program which can execute
library functions by feeding them with inputs provided by the fuzzer. In practice, fuzz drivers …
library functions by feeding them with inputs provided by the fuzzer. In practice, fuzz drivers …
{AmpFuzz}: Fuzzing for amplification {DDoS} vulnerabilities
Amplification DDoS attacks remain a prevalent and serious threat to the Internet, with recent
attacks reaching the Tbps range. However, all amplification attack vectors known to date …
attacks reaching the Tbps range. However, all amplification attack vectors known to date …
Reassembly is hard: a reflection on challenges and strategies
Reassembly, a branch of static binary rewriting, has become a focus of research today.
However, despite its widespread use and research interest, there have been no systematic …
However, despite its widespread use and research interest, there have been no systematic …
{MTSan}: A Feasible and Practical Memory Sanitizer for Fuzzing {COTS} Binaries
Fuzzing has been widely adopted for finding vulnerabilities in programs, especially when
source code is not available. But the effectiveness and efficiency of binary fuzzing are …
source code is not available. But the effectiveness and efficiency of binary fuzzing are …