A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

Learning program semantics with code representations: An empirical study

JK Siow, S Liu, X Xie, G Meng… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
Program semantics learning is the core and fundamental for various code intelligent tasks
eg, vulnerability detection, clone detection. A considerable amount of existing works …

Understanding large language model based fuzz driver generation

C Zhang, M Bai, Y Zheng, Y Li, W Ma, X Xie… - arXiv e …, 2023 - ui.adsabs.harvard.edu
Abstract LLM-based (Large Language Model) fuzz driver generation is a promising research
area. Unlike traditional program analysis-based method, this text-based approach is more …

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Y Zheng, Y Li, C Zhang, H Zhu, Y Liu… - Proceedings of the 31st …, 2022 - dl.acm.org
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …

Bleem: Packet sequence oriented fuzzing for protocol implementations

Z Luo, J Yu, F Zuo, J Liu, Y Jiang, T Chen… - 32nd USENIX Security …, 2023 - usenix.org
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …

Prompt Fuzzing for Fuzz Driver Generation

Y Lyu, Y Xie, P Chen, H Chen - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Crafting high-quality fuzz drivers not only is time-consuming but also requires a deep
understanding of the library. However, the state-of-the-art automatic fuzz driver generation …

A mutation-based method for multi-modal jailbreaking attack detection

X Zhang, C Zhang, T Li, Y Huang, X Jia, X Xie… - arXiv preprint arXiv …, 2023 - arxiv.org
Large Language Models and Multi-Modal LLMs have become pervasive, and so does the
importance of their security; yet, modern LLMs are known to be vulnerable to jailbreaking …

Hopper: Interpretative fuzzing for libraries

P Chen, Y Xie, Y Lyu, Y Wang, H Chen - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
Despite the fact that the state-of-the-art fuzzers can generate inputs efficiently, existing fuzz
drivers still cannot adequately cover entries in libraries. Most of these fuzz drivers are crafted …

Windranger: A directed greybox fuzzer driven by deviation basic blocks

Z Du, Y Li, Y Liu, B Mao - … of the 44th International Conference on …, 2022 - dl.acm.org
Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer
towards predefined target sites in the program. To gain directedness, DGF prioritizes the …

{GLeeFuzz}: Fuzzing {WebGL} Through Error Message Guided Mutation

H Peng, Z Yao, AA Sani, DJ Tian, M Payer - 32nd USENIX Security …, 2023 - usenix.org
WebGL is a set of standardized JavaScript APIs for GPU accelerated graphics. Security of
the WebGL interface is paramount because it exposes remote and unsandboxed access to …