Fuzzing: a survey for roadmap
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …
generates a large number of test cases and monitors the executions for defects. Fuzzing has …
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions
C Beaman, M Redbourne, JD Mummery, S Hakak - Computers & Security, 2022 - Elsevier
Fuzzing is a powerful tool for vulnerability discovery in software, with much progress being
made in the field in recent years. There is limited literature available on the fuzzing …
made in the field in recent years. There is limited literature available on the fuzzing …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
[PDF][PDF] Large language model guided protocol fuzzing
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …
specification of the protocol? Facing the internet, protocol implementations are particularly …
Fuzzing: a survey
Security vulnerability is one of the root causes of cyber-security threats. To discover
vulnerabilities and fix them in advance, researchers have proposed several techniques …
vulnerabilities and fix them in advance, researchers have proposed several techniques …
Fuzzing: State of the art
H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
[LIVRE][B] Internet-of-things (IoT) systems: architectures, algorithms, methodologies
D Serpanos, M Wolf - 2017 - Springer
The Internet of Things is the evolutionary step of the Internet that creates a worldwide
infrastructure interconnecting machines and humans. As the Internet became public in the …
infrastructure interconnecting machines and humans. As the Internet became public in the …
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
Fuzz testing has proven successful in finding security vulnerabilities in large programs.
However, traditional fuzz testing tools have a well-known common drawback: they are …
However, traditional fuzz testing tools have a well-known common drawback: they are …
[PDF][PDF] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Coverage-based fuzzing has been actively studied and widely adopted for finding
vulnerabilities in real-world software applications. With coverage information, such as …
vulnerabilities in real-world software applications. With coverage information, such as …
Security testing: A survey
Identifying vulnerabilities and ensuring security functionality by security testing is a widely
applied measure to evaluate and improve the security of software. Due to the openness of …
applied measure to evaluate and improve the security of software. Due to the openness of …