Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y Xiang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

AFLNet: a greybox fuzzer for network protocols

VT Pham, M Böhme… - 2020 IEEE 13th …, 2020 - ieeexplore.ieee.org
Server fuzzing is difficult. Unlike simple command-line tools, servers feature a massive state
space that can be traversed effectively only with well-defined sequences of input messages …

Magma: A ground-truth fuzzing benchmark

A Hazimeh, A Herrera, M Payer - … of the ACM on Measurement and …, 2020 - dl.acm.org
High scalability and low running costs have made fuzz testing the de facto standard for
discovering software bugs. Fuzzing techniques are constantly being improved in a race to …

An Abstract Syntax Tree based static fuzzing mutation for vulnerability evolution analysis

W Zheng, P Deng, K Gui, X Wu - Information and Software Technology, 2023 - Elsevier
Context: Zero-day vulnerabilities are highly destructive and sudden. However, traditional
static and dynamic testing methods cannot efficiently detect them. Objective: In this paper, a …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Smart greybox fuzzing

VT Pham, M Böhme, AE Santosa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …

Seed selection for successful fuzzing

A Herrera, H Gunadi, S Magrath, M Norrish… - Proceedings of the 30th …, 2021 - dl.acm.org
Mutation-based greybox fuzzing---unquestionably the most widely-used fuzzing technique---
relies on a set of non-crashing seed inputs (a corpus) to bootstrap the bug-finding process …

Fuzzing hardware like software

T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …