A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

[PDF][PDF] Driller: Augmenting fuzzing through selective symbolic execution.

N Stephens, J Grosen, C Salls, A Dutcher, R Wang… - NDSS, 2016 - yancomm.net
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …

BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis

R David, S Bardin, TD Ta, L Mounier… - 2016 IEEE 23rd …, 2016 - ieeexplore.ieee.org
When it comes to software analysis, several approaches exist from heuristic techniques to
formal methods, which are helpful at solving different kinds ofproblems. Unfortunately very …

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

J Vadayath, M Eckert, K Zeng, N Weideman… - 31st USENIX Security …, 2022 - usenix.org
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …

[PDF][PDF] Fuzzing: Art, science, and engineering

VJM Manes, HS Han, C Han, SK Cha, M Egele… - arxiv preprint arxiv …, 2018 - jiliac.com
Authors' addresses: Valentin JM Manès, KAIST CSRC, 291 Daehak-ro, Yuseong-gu,
Daejeon, 34141, Korea, valentin. manes@ kaist. ac. kr; HyungSeok Han, KAIST, 291 …

The art, science, and engineering of fuzzing: A survey

VJM Manes, HS Han, C Han, SK Cha, M Egele… - arxiv preprint arxiv …, 2018 - arxiv.org
Among the many software vulnerability discovery techniques available today, fuzzing has
remained highly popular due to its conceptual simplicity, its low barrier to deployment, and …

Hi-cfg: Construction by binary analysis and application to attack polymorphism

D Caselden, A Bazhanyuk, M Payer… - … –ESORICS 2013: 18th …, 2013 - Springer
Security analysis often requires understanding both the control and data-flow structure of a
binary. We introduce a new program representation, a hybrid information-and control-flow …