Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

{HYPERPILL}: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface

A Bulekov, Q Liu, M Egele, M Payer - 33rd USENIX Security Symposium …, 2024 - usenix.org
The security guarantees of cloud computing depend on the isolation guarantees of the
underlying hypervisors. Prior works have presented effective methods for automatically …

VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device

Y Liu, S Chen, Y Xie, Y Wang, L Chen… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Virtualization has been widely used in various scenarios, such as cloud computing. As its
core technology, virtualization hypervisor brings up the efficiency of sharing the physical …

Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries

H Xiong, Q Dai, R Chang, M Qiu, R Wang… - Proceedings of the 33rd …, 2024 - dl.acm.org
Fuzzing is an effective method for detecting security bugs in software, and there have been
quite a few effective works on fuzzing Android. Researchers have developed methods for …

EmbedFuzz: High Speed Fuzzing Through Transplantation

F Hofhammer, Q Wang, A Bhattacharyya… - arXiv preprint arXiv …, 2024 - arxiv.org
Dynamic analysis and especially fuzzing are challenging tasks for embedded firmware
running on modern low-end Microcontroller Units (MCUs) due to performance overheads …

A Survey of Network Protocol Fuzzing: Model, Techniques and Directions

S Jiang, Y Zhang, J Li, H Yu, L Luo, G Sun - arXiv preprint arXiv …, 2024 - arxiv.org
As one of the most successful and effective software testing techniques in recent years, fuzz
testing has uncovered numerous bugs and vulnerabilities in modern software, including …

A Comparative Quality Metric for Untargeted Fuzzing with Logic State Coverage

G Lee - arXiv preprint arXiv:2409.14987, 2024 - arxiv.org
While fuzzing is widely accepted as an efficient program testing technique, it is still unclear
how to measure the comparative quality of different fuzzers. The current de facto quality …

[PDF][PDF] SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation

F Hofhammer, M Busch, Q Wang, M Egele, M Payer - 2024 - hexhive.epfl.ch
Dynamic analysis of microcontroller-based embedded firmware remains challenging. The
general lack of source code availability for Commercial-off-the-shelf (COTS) firmware …

Reshaping input spaces to fuzz complex targets

A Bulekov - 2024 - open.bu.edu
In recent years, fuzz-testing has appeared as the dominant technique for automatically
finding security issues in software.“Off-the-shelf” fuzzers such as AFL (++) and libFuzzer …

[PDF][PDF] Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices

Z Ma, Q Liu, Z Li, T Yin, W Tan, C Zhang, M Payer - hexhive.epfl.ch
Virtual devices are a large attack surface of hypervisors. Vulnerabilities in virtual devices
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …