A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
Learning program semantics with code representations: An empirical study
Program semantics learning is the core and fundamental for various code intelligent tasks
eg, vulnerability detection, clone detection. A considerable amount of existing works …
eg, vulnerability detection, clone detection. A considerable amount of existing works …
Understanding large language model based fuzz driver generation
Abstract LLM-based (Large Language Model) fuzz driver generation is a promising research
area. Unlike traditional program analysis-based method, this text-based approach is more …
area. Unlike traditional program analysis-based method, this text-based approach is more …
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …
Bleem: Packet sequence oriented fuzzing for protocol implementations
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …
in the implementations can easily render devices vulnerable to adversaries. Therefore …
Prompt Fuzzing for Fuzz Driver Generation
Y Lyu, Y Xie, P Chen, H Chen - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Crafting high-quality fuzz drivers not only is time-consuming but also requires a deep
understanding of the library. However, the state-of-the-art automatic fuzz driver generation …
understanding of the library. However, the state-of-the-art automatic fuzz driver generation …
A mutation-based method for multi-modal jailbreaking attack detection
Large Language Models and Multi-Modal LLMs have become pervasive, and so does the
importance of their security; yet, modern LLMs are known to be vulnerable to jailbreaking …
importance of their security; yet, modern LLMs are known to be vulnerable to jailbreaking …
Hopper: Interpretative fuzzing for libraries
P Chen, Y Xie, Y Lyu, Y Wang, H Chen - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Despite the fact that the state-of-the-art fuzzers can generate inputs efficiently, existing fuzz
drivers still cannot adequately cover entries in libraries. Most of these fuzz drivers are crafted …
drivers still cannot adequately cover entries in libraries. Most of these fuzz drivers are crafted …
Windranger: A directed greybox fuzzer driven by deviation basic blocks
Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer
towards predefined target sites in the program. To gain directedness, DGF prioritizes the …
towards predefined target sites in the program. To gain directedness, DGF prioritizes the …
{GLeeFuzz}: Fuzzing {WebGL} Through Error Message Guided Mutation
WebGL is a set of standardized JavaScript APIs for GPU accelerated graphics. Security of
the WebGL interface is paramount because it exposes remote and unsandboxed access to …
the WebGL interface is paramount because it exposes remote and unsandboxed access to …