Demystify the fuzzing methods: A comprehensive survey
S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …
structures; in such cases, vulnerabilities in the software become inevitable. The …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
One fuzzing strategy to rule them all
Coverage-guided fuzzing has become mainstream in fuzzing to automatically expose
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …
Selectfuzz: Efficient directed fuzzing with selective path exploration
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …
to many security applications such as reproducing known crashes and detecting …
A systematic review of fuzzing
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …
generating a large number of test cases against target programs to discover unexpected …
{PolyFuzz}: Holistic Greybox Fuzzing of {Multi-Language} Systems
While offering many advantages during software process, the practice of using multiple
programming languages in constructing one software system also introduces additional …
programming languages in constructing one software system also introduces additional …
{WingFuzz}: Implementing continuous fuzzing for {DBMSs}
Database management systems (DBMSs) are critical components within software
ecosystems, and their security and stability are paramount. In recent years, fuzzing has …
ecosystems, and their security and stability are paramount. In recent years, fuzzing has …
Critical code guided directed greybox fuzzing for commits
Newly submitted commits are prone to introducing vulnerabilities into programs. As a
promising countermeasure, directed greybox fuzzers can be employed to test commit …
promising countermeasure, directed greybox fuzzers can be employed to test commit …
Fuzz on the beach: Fuzzing solana smart contracts
Solana has quickly emerged as a popular platform for building decentralized applications
(DApps), such as marketplaces for non-fungible tokens (NFTs). A key reason for its success …
(DApps), such as marketplaces for non-fungible tokens (NFTs). A key reason for its success …
Evaluating and improving hybrid fuzzing
To date, various hybrid fuzzers have been proposed for maximal program vulnerability
exposure by integrating the power of fuzzing strategies and concolic executors. While the …
exposure by integrating the power of fuzzing strategies and concolic executors. While the …