A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

Llmif: Augmented large language model for fuzzing iot devices

J Wang, L Yu, X Luo - 2024 IEEE Symposium on Security and Privacy …, 2024 - computer.org
Despite the efficacy of fuzzing in verifying the implementation correctness of IoT protocols,
existing IoT fuzzing approaches grapple with several limitations, including unknown …

DeepDiffer: Find Deep Learning Compiler Bugs via Priority-guided Differential Fuzzing

K Lin, X Song, Y Zeng, S Guo - 2023 IEEE 23rd International …, 2023 - ieeexplore.ieee.org
Recently, Deep learning (DL) compilers have been widely developed to optimize the
deployment of DL models. These DL compilers transform DL models into high-level …

PromeTrans: Bootstrap binary functionality classification with knowledge transferred from pre-trained models

Z Sha, C Zhang, H Wang, Z Gao, B Zhang… - Empirical Software …, 2025 - Springer
Pre-trained models have witnessed significant progress in nature language (including
source code) and binary code comprehension. However, none of them are suitable for …

[PDF][PDF] EP-Detector: Automatic Detection of Error-prone Operation Anomalies in Android Applications

C Guo, Q Wang, N Dong, L Fan, T Wang… - 2025 IEEE/ACM …, 2024 - lingling-fan.github.io
Android applications are pervasively adopted and heavily relied on in our daily life, leading
to the growing demand for enhanced user experiences, such as ease for operation and …

FuzzFabric: A Scalable Grey-box Fuzzing Framework for Polymorphic Network Services

B Yu, L Zhou, C Cai, Q Yang, Y Yang… - … Conference on Web …, 2024 - ieeexplore.ieee.org
Fuzzing network protocols is challenging due to their various factors including syntax, state
transition, and even conformation of its executable software. To achieve better convenience …

Systematic Review of Fuzzing in IoT: Evaluating Techniques, Vulnerabilities, and Research Gaps

A Touqir, F Iradat, A Rakib, N Taskin, H Jadidbonab… - 2024 - researchsquare.com
As our dependence on the internet and digital platforms grows, the risk of cyber threats rises,
making it essential to implement effective Measures to safeguard sensitive information …

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.

C Zhang, Y Li, H Zhou, X Zhang, Y Zheng… - USENIX Security …, 2023 - usenix.org
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation Page 1 Public Automata-Guided
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, **aohan …

IoTAEG: Automatic Exploit Generation of IoT Devices

Y Wang, Z Li, Y Zhang, Y Zhai - 2023 4th International …, 2023 - ieeexplore.ieee.org
Automatic exploit generation (AEG) refers to the process of automatically finding the path in
the program that can trigger vulnerabilities and generate exploits. Generally speaking, the …