A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
A taxonomy of IoT firmware security and principal firmware analysis techniques
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …
standardization process in IoT systems for a secure IoT solution is still in its early days …
Llmif: Augmented large language model for fuzzing iot devices
Despite the efficacy of fuzzing in verifying the implementation correctness of IoT protocols,
existing IoT fuzzing approaches grapple with several limitations, including unknown …
existing IoT fuzzing approaches grapple with several limitations, including unknown …
DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing
Recently, Deep learning (DL) compilers have been widely developed to optimize the
deployment of DL models. These DL compilers transform DL models into high-level …
deployment of DL models. These DL compilers transform DL models into high-level …
PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …
source code) and binary code comprehension. However, none of them are suitable for …
[PDF][PDF] EP-Detector: Automatic Detection of Error-prone Operation Anomalies in Android Applications
Android applications are pervasively adopted and heavily relied on in our daily life, leading
to the growing demand for enhanced user experiences, such as ease for operation and …
to the growing demand for enhanced user experiences, such as ease for operation and …
FuzzFabric: A Scalable Grey-box Fuzzing Framework for Polymorphic Network Services
B Yu, L Zhou, C Cai, Q Yang, Y Yang… - … Conference on Web …, 2024 - ieeexplore.ieee.org
Fuzzing network protocols is challenging due to their various factors including syntax, state
transition, and even conformation of its executable software. To achieve better convenience …
transition, and even conformation of its executable software. To achieve better convenience …
Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps
A Touqir, F Iradat, A Rakib, N Taskin, H Jadidbonab… - 2024 - researchsquare.com
As our dependence on the internet and digital platforms grows, the risk of cyber threats rises,
making it essential to implement effective Measures to safeguard sensitive information …
making it essential to implement effective Measures to safeguard sensitive information …
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation Page 1 Public Automata-Guided
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, **aohan …
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, **aohan …
IoTAEG: Automatic Exploit Generation of IoT Devices
Y Wang, Z Li, Y Zhang, Y Zhai - 2023 4th International …, 2023 - ieeexplore.ieee.org
Automatic exploit generation (AEG) refers to the process of automatically finding the path in
the program that can trigger vulnerabilities and generate exploits. Generally speaking, the …
the program that can trigger vulnerabilities and generate exploits. Generally speaking, the …