A systematic review of fuzzing techniques
C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …
Challenges in firmware re-hosting, emulation, and analysis
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …
various security and performance related questions, such as determining whether a …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
[PDF][PDF] Driller: Augmenting Fuzzing Through Selective Symbolic Execution
N Stephens - 2016 - jacopo.cc
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …
exploit to obtain unauthorized access to confidential information. As products with access to …
BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis
When it comes to software analysis, several approaches exist from heuristic techniques to
formal methods, which are helpful at solving different kinds ofproblems. Unfortunately very …
formal methods, which are helpful at solving different kinds ofproblems. Unfortunately very …
Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …
binary program analysis approaches are limited by inherent trade-offs between accuracy …
[PDF][PDF] Fuzzing: Art, science, and engineering
Authors' addresses: Valentin JM Manès, KAIST CSRC, 291 Daehak-ro, Yuseong-gu,
Daejeon, 34141, Korea, valentin. manes@ kaist. ac. kr; HyungSeok Han, KAIST, 291 …
Daejeon, 34141, Korea, valentin. manes@ kaist. ac. kr; HyungSeok Han, KAIST, 291 …
Hi-cfg: Construction by binary analysis and application to attack polymorphism
D Caselden, A Bazhanyuk, M Payer… - … –ESORICS 2013: 18th …, 2013 - Springer
Security analysis often requires understanding both the control and data-flow structure of a
binary. We introduce a new program representation, a hybrid information-and control-flow …
binary. We introduce a new program representation, a hybrid information-and control-flow …
LigRE: Reverse-engineering of control and data flow models for black-box XSS detection
Fuzz testing consists of automatically generating and sending malicious inputs to an
application in order to hopefully trigger a vulnerability. In order to be efficient, the fuzzing …
application in order to hopefully trigger a vulnerability. In order to be efficient, the fuzzing …