A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
A systematic literature review of android malware detection using static analysis
Android malware has been in an increasing trend in recent years due to the pervasiveness
of Android operating system. Android malware is installed and run on the smartphones …
of Android operating system. Android malware is installed and run on the smartphones …
{AFL++}: Combining incremental steps of fuzzing research
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …
state-of-the-art fuzzing research, to make the research comparable, reproducible …
Manticore: A user-friendly symbolic execution framework for binaries and smart contracts
An effective way to maximize code coverage in software tests is through dynamic symbolic
execution-a technique that uses constraint solving to systematically explore a program's …
execution-a technique that uses constraint solving to systematically explore a program's …
Angora: Efficient fuzzing by principled search
P Chen, H Chen - 2018 IEEE Symposium on Security and …, 2018 - ieeexplore.ieee.org
Fuzzing is a popular technique for finding software bugs. However, the performance of the
state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution …
state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution …
{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …
concolic execution by combining both approaches. The hybrid approach has shown its …
Llm4vuln: A unified evaluation framework for decoupling and enhancing llms' vulnerability reasoning
Large language models (LLMs) have demonstrated significant potential in various tasks,
including vulnerability detection. However, current efforts in this area are preliminary, lacking …
including vulnerability detection. However, current efforts in this area are preliminary, lacking …
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution
Speculative execution side-channel vulnerabilities in micro-architecture processors have
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
raised concerns about the security of Intel SGX. To understand clearly the security impact of …
T-Fuzz: fuzzing by program transformation
H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Fuzzing is a simple yet effective approach to discover software bugs utilizing randomly
generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …
generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …
Steelix: program-state based binary fuzzing
Coverage-based fuzzing is one of the most effective techniques to find vulnerabilities, bugs
or crashes. However, existing techniques suffer from the difficulty in exercising the paths that …
or crashes. However, existing techniques suffer from the difficulty in exercising the paths that …