Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

One fuzzing strategy to rule them all

M Wu, L Jiang, J **ang, Y Huang, H Cui… - Proceedings of the 44th …, 2022 - dl.acm.org
Coverage-guided fuzzing has become mainstream in fuzzing to automatically expose
program vulnerabilities. Recently, a group of fuzzers are proposed to adopt a random search …

Selectfuzz: Efficient directed fuzzing with selective path exploration

C Luo, W Meng, P Li - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …

A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

{PolyFuzz}: Holistic Greybox Fuzzing of {Multi-Language} Systems

W Li, J Ruan, G Yi, L Cheng, X Luo, H Cai - 32nd USENIX Security …, 2023 - usenix.org
While offering many advantages during software process, the practice of using multiple
programming languages in constructing one software system also introduces additional …

{WingFuzz}: Implementing continuous fuzzing for {DBMSs}

J Liang, Z Wu, J Fu, Y Bai, Q Zhang… - 2024 USENIX Annual …, 2024 - usenix.org
Database management systems (DBMSs) are critical components within software
ecosystems, and their security and stability are paramount. In recent years, fuzzing has …

Critical code guided directed greybox fuzzing for commits

Y **ang, X Zhang, P Liu, S Ji, H Liang, J Xu… - 33rd USENIX Security …, 2024 - usenix.org
Newly submitted commits are prone to introducing vulnerabilities into programs. As a
promising countermeasure, directed greybox fuzzers can be employed to test commit …

Fuzz on the beach: Fuzzing solana smart contracts

S Smolka, JR Giesen, P Winkler, O Draissi… - Proceedings of the …, 2023 - dl.acm.org
Solana has quickly emerged as a popular platform for building decentralized applications
(DApps), such as marketplaces for non-fungible tokens (NFTs). A key reason for its success …

Evaluating and improving hybrid fuzzing

L Jiang, H Yuan, M Wu, L Zhang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
To date, various hybrid fuzzers have been proposed for maximal program vulnerability
exposure by integrating the power of fuzzing strategies and concolic executors. While the …