Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y **ang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Evaluating fuzz testing

G Klees, A Ruef, B Cooper, S Wei, M Hicks - Proceedings of the 2018 …, 2018 - dl.acm.org
Fuzz testing has enjoyed great success at discovering security critical bugs in real software.
Recently, researchers have devoted significant effort to devising new fuzzing techniques …

Collafl: Path sensitive fuzzing

S Gan, C Zhang, X Qin, X Tu, K Li… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Coverage-guided fuzzing is a widely used and effective solution to find software
vulnerabilities. Tracking code coverage and utilizing it to guide fuzzing are crucial to …

{MOPT}: Optimized mutation scheduling for fuzzers

C Lyu, S Ji, C Zhang, Y Li, WH Lee, Y Song… - 28th USENIX Security …, 2019 - usenix.org
Mutation-based fuzzing is one of the most popular vulnerability discovery solutions. Its
performance of generating interesting test cases highly depends on the mutation scheduling …

Magma: A ground-truth fuzzing benchmark

A Hazimeh, A Herrera, M Payer - … of the ACM on Measurement and …, 2020 - dl.acm.org
High scalability and low running costs have made fuzz testing the de facto standard for
discovering software bugs. Fuzzing techniques are constantly being improved in a race to …

Neuzz: Efficient fuzzing with neural program smoothing

D She, K Pei, D Epstein, J Yang… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Fuzzing has become the de facto standard technique for finding software vulnerabilities.
However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger …

Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …

{GREYONE}: Data flow sensitive fuzzing

S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu… - 29th USENIX security …, 2020 - usenix.org
Data flow analysis (eg, dynamic taint analysis) has proven to be useful for guiding fuzzers to
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …

Smart greybox fuzzing

VT Pham, M Böhme, AE Santosa… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …

Perffuzz: Automatically generating pathological inputs

C Lemieux, R Padhye, K Sen, D Song - Proceedings of the 27th ACM …, 2018 - dl.acm.org
Performance problems in software can arise unexpectedly when programs are provided with
inputs that exhibit worst-case behavior. A large body of work has focused on diagnosing …