A systematic review of fuzzing techniques

C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

[PDF][PDF] Driller: Augmenting Fuzzing Through Selective Symbolic Execution

N Stephens - 2016 - jacopo.cc
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …

BINSEC/SE: A dynamic symbolic execution toolkit for binary-level analysis

R David, S Bardin, TD Ta, L Mounier… - 2016 IEEE 23rd …, 2016 - ieeexplore.ieee.org
When it comes to software analysis, several approaches exist from heuristic techniques to
formal methods, which are helpful at solving different kinds ofproblems. Unfortunately very …

Arbiter: Bridging the static and dynamic divide in vulnerability discovery on binary programs

J Vadayath, M Eckert, K Zeng, N Weideman… - 31st USENIX Security …, 2022 - usenix.org
In spite of their effectiveness in the context of vulnerability discovery, current state-of-the-art
binary program analysis approaches are limited by inherent trade-offs between accuracy …

[PDF][PDF] Fuzzing: Art, science, and engineering

VJM Manes, HS Han, C Han, SK Cha, M Egele… - arxiv preprint arxiv …, 2018 - jiliac.com
Authors' addresses: Valentin JM Manès, KAIST CSRC, 291 Daehak-ro, Yuseong-gu,
Daejeon, 34141, Korea, valentin. manes@ kaist. ac. kr; HyungSeok Han, KAIST, 291 …

Hi-cfg: Construction by binary analysis and application to attack polymorphism

D Caselden, A Bazhanyuk, M Payer… - … –ESORICS 2013: 18th …, 2013 - Springer
Security analysis often requires understanding both the control and data-flow structure of a
binary. We introduce a new program representation, a hybrid information-and control-flow …

LigRE: Reverse-engineering of control and data flow models for black-box XSS detection

F Duchene, S Rawat, JL Richier… - 2013 20th Working …, 2013 - ieeexplore.ieee.org
Fuzz testing consists of automatically generating and sending malicious inputs to an
application in order to hopefully trigger a vulnerability. In order to be efficient, the fuzzing …