Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

{StateFuzz}: System {Call-Based}{State-Aware} Linux Driver Fuzzing

B Zhao, Z Li, S Qin, Z Ma, M Yuan, W Zhu… - 31st USENIX Security …, 2022 - usenix.org
Coverage-guided fuzzing has achieved great success in finding software vulnerabilities.
Existing coverage-guided fuzzers generally favor test cases that hit new code, and discard …

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Y Zheng, Y Li, C Zhang, H Zhu, Y Liu… - Proceedings of the 31st …, 2022 - dl.acm.org
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …

Sofi: Reflection-augmented fuzzing for javascript engines

X He, X Xie, Y Li, J Sun, F Li, W Zou, Y Liu… - Proceedings of the …, 2021 - dl.acm.org
JavaScript engines have been shown prone to security vulnerabilities, which can lead to
serious consequences due to their popularity. Fuzzing is an effective testing technique to …

Linear-time temporal logic guided greybox fuzzing

R Meng, Z Dong, J Li, I Beschastnikh… - Proceedings of the 44th …, 2022 - dl.acm.org
Software model checking as well as runtime verification are verification techniques which
are widely used for checking temporal properties of software systems. Even though they are …

SLIME: program-sensitive energy allocation for fuzzing

C Lyu, H Liang, S Ji, X Zhang, B Zhao, M Han… - Proceedings of the 31st …, 2022 - dl.acm.org
The energy allocation strategy is one of the most popular techniques in fuzzing to improve
code coverage and vulnerability discovery. The core intuition is that fuzzers should allocate …

Accelerating fuzzing through prefix-guided execution

S Li, Z Su - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
Coverage-guided fuzzing is one of the most effective approaches for discovering software
defects and vulnerabilities. It executes all mutated tests from seed inputs to expose coverage …

Windranger: A directed greybox fuzzer driven by deviation basic blocks

Z Du, Y Li, Y Liu, B Mao - … of the 44th International Conference on …, 2022 - dl.acm.org
Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer
towards predefined target sites in the program. To gain directedness, DGF prioritizes the …

Graph-based seed object synthesis for search-based unit testing

Y Lin, YS Ong, J Sun, G Fraser, JS Dong - … of the 29th ACM Joint Meeting …, 2021 - dl.acm.org
Search-based software testing (SBST) generates tests using search algorithms guided by
measurements gauging how far a test case is away from exercising a coverage goal. The …

Large-scale analysis of non-termination bugs in real-world oss projects

X Shi, X Xie, Y Li, Y Zhang, S Chen, X Li - Proceedings of the 30th ACM …, 2022 - dl.acm.org
Termination is a crucial program property. Non-termination bugs can be subtle to detect and
may remain hidden for long before they take effect. Many real-world programs still suffer …