Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

{EL3XIR}: Fuzzing {COTS} Secure Monitors

C Lindenmeier, M Payer, M Busch - 33rd USENIX Security Symposium …, 2024 - usenix.org
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …

[PDF][PDF] Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs.

T Scharnowski, S Wörner, F Buchmann, N Bars… - 2023 - usenix.org
Embedded systems with their diverse, interconnected components form the backbone of our
digital infrastructure. Despite their importance, analyzing their security in a scalable way has …

{HYPERPILL}: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface

A Bulekov, Q Liu, M Egele, M Payer - 33rd USENIX Security Symposium …, 2024 - usenix.org
The security guarantees of cloud computing depend on the isolation guarantees of the
underlying hypervisors. Prior works have presented effective methods for automatically …

Videzzo: Dependency-aware virtual device fuzzing

Q Liu, F Toffalini, Y Zhou… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
A virtual machine interacts with its host environment through virtual devices, driven by virtual
device messages, eg, I/O operations. By issuing crafted messages, an adversary can exploit …

Printfuzz: Fuzzing linux drivers via automated virtual device simulation

Z Ma, B Zhao, L Ren, Z Li, S Ma, X Luo… - Proceedings of the 31st …, 2022 - dl.acm.org
Linux drivers share the same address space and privilege with the core of the kernel but
have a much larger code base and attack surface. The Linux drivers are not well tested and …

[PDF][PDF] No grammar, no problem: Towards fuzzing the linux kernel without system-call descriptions

A Bulekov, B Das, S Hajnoczi, M Egele - Network and Distributed System …, 2023 - par.nsf.gov
The integrity of the entire computing ecosystem depends on the security of our operating
systems (OSes). Unfortunately, due to the scale and complexity of OS code, hundreds of …

Morphuzz: Bending (input) space to fuzz virtual devices

A Bulekov, B Das, S Hajnoczi, M Egele - 31st USENIX Security …, 2022 - usenix.org
The security of the entire cloud ecosystem crucially depends on the isolation guarantees that
hypervisors provide between guest VMs and the host system. To allow VMs to communicate …

A Usability Evaluation of AFL and libFuzzer with CS Students

S Plöger, M Meier, M Smith - Proceedings of the 2023 CHI Conference …, 2023 - dl.acm.org
In top-tier companies and academia, fuzzing has established itself as a valuable tool for
finding bugs. It is a tool created by experts for experts, and a lot of research is being invested …