The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
Tools for reduced precision computation: a survey
S Cherubin, G Agosta - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The use of reduced precision to improve performance metrics such as computation latency
and power consumption is a common practice in the embedded systems field. This practice …
and power consumption is a common practice in the embedded systems field. This practice …
Savior: Towards bug-driven hybrid testing
Hybrid testing combines fuzz testing and concolic execution. It leverages fuzz testing to test
easy-to-reach code regions and uses concolic execution to explore code blocks guarded by …
easy-to-reach code regions and uses concolic execution to explore code blocks guarded by …
SoK: Sanitizing for security
The C and C++ programming languages are notoriously insecure yet remain indispensable.
Developers therefore resort to a multi-pronged approach to find security issues before …
Developers therefore resort to a multi-pronged approach to find security issues before …
Systematic fuzzing and testing of TLS libraries
J Somorovsky - Proceedings of the 2016 ACM SIGSAC conference on …, 2016 - dl.acm.org
We present TLS-Attacker, an open source framework for evaluating the security of TLS
libraries. TLS-Attacker allows security engineers to create custom TLS message flows and …
libraries. TLS-Attacker allows security engineers to create custom TLS message flows and …
Towards optimization-safe systems: Analyzing the impact of undefined behavior
This paper studies an emerging class of software bugs called optimization-unstable code:
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …
code that is unexpectedly discarded by compiler optimizations due to undefined behavior in …
Finding bugs in database systems via query partitioning
Logic bugs in Database Management Systems (DBMSs) are bugs that cause an incorrect
result for a given query, for example, by omitting a row that should be fetched. These bugs …
result for a given query, for example, by omitting a row that should be fetched. These bugs …
The correctness-security gap in compiler optimization
There is a significant body of work devoted to testing, verifying, and certifying the correctness
of optimizing compilers. The focus of such work is to determine if source code and optimized …
of optimizing compilers. The focus of such work is to determine if source code and optimized …
Improving integer security for systems with {KINT}
Integer errors have emerged as an important threat to systems security, because they allow
exploits such as buffer overflow and privilege escalation. This paper presents KINT, a tool …
exploits such as buffer overflow and privilege escalation. This paper presents KINT, a tool …
Exposing numerical bugs in deep learning via gradient back-propagation
Numerical computation is dominant in deep learning (DL) programs. Consequently,
numerical bugs are one of the most prominent kinds of defects in DL programs. Numerical …
numerical bugs are one of the most prominent kinds of defects in DL programs. Numerical …