Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …

{ParmeSan}: Sanitizer-guided greybox fuzzing

S Österlund, K Razavi, H Bos, C Giuffrida - 29th USENIX Security …, 2020 - usenix.org
One of the key questions when fuzzing is where to look for vulnerabilities. Coverage-guided
fuzzers indiscriminately optimize for covering as much code as possible given that bug …

Learning program semantics with code representations: An empirical study

JK Siow, S Liu, X Xie, G Meng… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Program semantics learning is the core and fundamental for various code intelligent tasks
eg, vulnerability detection, clone detection. A considerable amount of existing works …

Leopard: Identifying vulnerable code for vulnerability assessment through program metrics

X Du, B Chen, Y Li, J Guo, Y Zhou… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Identifying potentially vulnerable locations in a code base is critical as a pre-step for effective
vulnerability assessment; ie, it can greatly help security experts put their time and effort to …

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection

Y Li, Y Xue, H Chen, X Wu, C Zhang, X Xie… - Proceedings of the …, 2019 - dl.acm.org
Existing greybox fuzzers mainly utilize program coverage as the goal to guide the fuzzing
process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the …

Sofi: Reflection-augmented fuzzing for javascript engines

X He, X Xie, Y Li, J Sun, F Li, W Zou, Y Liu… - Proceedings of the …, 2021 - dl.acm.org
JavaScript engines have been shown prone to security vulnerabilities, which can lead to
serious consequences due to their popularity. Fuzzing is an effective testing technique to …

{APICraft}: Fuzz driver generation for closed-source {SDK} libraries

C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen… - 30th USENIX Security …, 2021 - usenix.org
Fuzz drivers are needed for fuzzing libraries. A fuzz driver is a program which can execute
library functions by feeding them with inputs provided by the fuzzer. In practice, fuzz drivers …

{AmpFuzz}: Fuzzing for amplification {DDoS} vulnerabilities

J Krupp, I Grishchenko, C Rossow - 31st USENIX Security Symposium …, 2022 - usenix.org
Amplification DDoS attacks remain a prevalent and serious threat to the Internet, with recent
attacks reaching the Tbps range. However, all amplification attack vectors known to date …

Reassembly is hard: a reflection on challenges and strategies

H Kim, S Kim, J Lee, K Jee, SK Cha - 32nd USENIX Security Symposium …, 2023 - usenix.org
Reassembly, a branch of static binary rewriting, has become a focus of research today.
However, despite its widespread use and research interest, there have been no systematic …

{MTSan}: A Feasible and Practical Memory Sanitizer for Fuzzing {COTS} Binaries

X Chen, Y Shi, Z Jiang, Y Li, R Wang, H Duan… - 32nd USENIX Security …, 2023 - usenix.org
Fuzzing has been widely adopted for finding vulnerabilities in programs, especially when
source code is not available. But the effectiveness and efficiency of binary fuzzing are …