A systematic survey of attack detection and prevention in connected and autonomous vehicles
The number of Connected and Autonomous Vehicles (CAVs) is increasing rapidly in various
smart transportation services and applications, considering many benefits to society, people …
smart transportation services and applications, considering many benefits to society, people …
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
{AFL++}: Combining incremental steps of fuzzing research
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …
state-of-the-art fuzzing research, to make the research comparable, reproducible …
[PDF][PDF] Large language model guided protocol fuzzing
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …
specification of the protocol? Facing the internet, protocol implementations are particularly …
AFLNet: a greybox fuzzer for network protocols
Server fuzzing is difficult. Unlike simple command-line tools, servers feature a massive state
space that can be traversed effectively only with well-defined sequences of input messages …
space that can be traversed effectively only with well-defined sequences of input messages …
Libafl: A framework to build modular and reusable fuzzers
The release of AFL marked an important milestone in the area of software security testing,
revitalizing fuzzing as a major research topic and spurring a large number of research …
revitalizing fuzzing as a major research topic and spurring a large number of research …
On the reliability of coverage-based fuzzer benchmarking
Given a program where none of our fuzzers finds any bugs, how do we know which fuzzer is
better? In practice, we often look to code coverage as a proxy measure of fuzzer …
better? In practice, we often look to code coverage as a proxy measure of fuzzer …
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
{EcoFuzz}: Adaptive {Energy-Saving} greybox fuzzing as a variant of the adversarial {Multi-Armed} bandit
Fuzzing is one of the most effective approaches for identifying security vulnerabilities. As a
state-of-the-art coverage-based greybox fuzzer, AFL is a highly effective and widely used …
state-of-the-art coverage-based greybox fuzzer, AFL is a highly effective and widely used …
Ijon: Exploring deep state spaces via fuzzing
Although current fuzz testing (fuzzing) methods are highly effective, there are still many
situations such as complex state machines where fully automated approaches fail. State-of …
situations such as complex state machines where fully automated approaches fail. State-of …