Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
{EL3XIR}: Fuzzing {COTS} Secure Monitors
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
WaVe: a verifiably secure WebAssembly sandboxing runtime
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …
benefits of hardwarebased memory protection without requiring operating system …
[PDF][PDF] Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs.
Embedded systems with their diverse, interconnected components form the backbone of our
digital infrastructure. Despite their importance, analyzing their security in a scalable way has …
digital infrastructure. Despite their importance, analyzing their security in a scalable way has …
{HYPERPILL}: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface
The security guarantees of cloud computing depend on the isolation guarantees of the
underlying hypervisors. Prior works have presented effective methods for automatically …
underlying hypervisors. Prior works have presented effective methods for automatically …
Videzzo: Dependency-aware virtual device fuzzing
A virtual machine interacts with its host environment through virtual devices, driven by virtual
device messages, eg, I/O operations. By issuing crafted messages, an adversary can exploit …
device messages, eg, I/O operations. By issuing crafted messages, an adversary can exploit …
Printfuzz: Fuzzing linux drivers via automated virtual device simulation
Linux drivers share the same address space and privilege with the core of the kernel but
have a much larger code base and attack surface. The Linux drivers are not well tested and …
have a much larger code base and attack surface. The Linux drivers are not well tested and …
[PDF][PDF] No grammar, no problem: Towards fuzzing the linux kernel without system-call descriptions
The integrity of the entire computing ecosystem depends on the security of our operating
systems (OSes). Unfortunately, due to the scale and complexity of OS code, hundreds of …
systems (OSes). Unfortunately, due to the scale and complexity of OS code, hundreds of …
Morphuzz: Bending (input) space to fuzz virtual devices
The security of the entire cloud ecosystem crucially depends on the isolation guarantees that
hypervisors provide between guest VMs and the host system. To allow VMs to communicate …
hypervisors provide between guest VMs and the host system. To allow VMs to communicate …
A Usability Evaluation of AFL and libFuzzer with CS Students
S Plöger, M Meier, M Smith - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
In top-tier companies and academia, fuzzing has established itself as a valuable tool for
finding bugs. It is a tool created by experts for experts, and a lot of research is being invested …
finding bugs. It is a tool created by experts for experts, and a lot of research is being invested …