Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
{HYPERPILL}: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface
The security guarantees of cloud computing depend on the isolation guarantees of the
underlying hypervisors. Prior works have presented effective methods for automatically …
underlying hypervisors. Prior works have presented effective methods for automatically …
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device
Virtualization has been widely used in various scenarios, such as cloud computing. As its
core technology, virtualization hypervisor brings up the efficiency of sharing the physical …
core technology, virtualization hypervisor brings up the efficiency of sharing the physical …
Atlas: Automating Cross-Language Fuzzing on Android Closed-Source Libraries
H Xiong, Q Dai, R Chang, M Qiu, R Wang… - Proceedings of the 33rd …, 2024 - dl.acm.org
Fuzzing is an effective method for detecting security bugs in software, and there have been
quite a few effective works on fuzzing Android. Researchers have developed methods for …
quite a few effective works on fuzzing Android. Researchers have developed methods for …
EmbedFuzz: High Speed Fuzzing Through Transplantation
F Hofhammer, Q Wang, A Bhattacharyya… - arXiv preprint arXiv …, 2024 - arxiv.org
Dynamic analysis and especially fuzzing are challenging tasks for embedded firmware
running on modern low-end Microcontroller Units (MCUs) due to performance overheads …
running on modern low-end Microcontroller Units (MCUs) due to performance overheads …
A Survey of Network Protocol Fuzzing: Model, Techniques and Directions
As one of the most successful and effective software testing techniques in recent years, fuzz
testing has uncovered numerous bugs and vulnerabilities in modern software, including …
testing has uncovered numerous bugs and vulnerabilities in modern software, including …
A Comparative Quality Metric for Untargeted Fuzzing with Logic State Coverage
G Lee - arXiv preprint arXiv:2409.14987, 2024 - arxiv.org
While fuzzing is widely accepted as an efficient program testing technique, it is still unclear
how to measure the comparative quality of different fuzzers. The current de facto quality …
how to measure the comparative quality of different fuzzers. The current de facto quality …
[PDF][PDF] SURGEON: Performant, Flexible, and Accurate Re-Hosting via Transplantation
Dynamic analysis of microcontroller-based embedded firmware remains challenging. The
general lack of source code availability for Commercial-off-the-shelf (COTS) firmware …
general lack of source code availability for Commercial-off-the-shelf (COTS) firmware …
Reshaping input spaces to fuzz complex targets
A Bulekov - 2024 - open.bu.edu
In recent years, fuzz-testing has appeared as the dominant technique for automatically
finding security issues in software.“Off-the-shelf” fuzzers such as AFL (++) and libFuzzer …
finding security issues in software.“Off-the-shelf” fuzzers such as AFL (++) and libFuzzer …
[PDF][PDF] Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices
Virtual devices are a large attack surface of hypervisors. Vulnerabilities in virtual devices
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …