Large language models for software engineering: A systematic literature review

X Hou, Y Zhao, Y Liu, Z Yang, K Wang, L Li… - ACM Transactions on …, 2024 - dl.acm.org
Large Language Models (LLMs) have significantly impacted numerous domains, including
Software Engineering (SE). Many recent publications have explored LLMs applied to …

Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y **ang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

{AFL++}: Combining incremental steps of fuzzing research

A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX workshop on …, 2020 - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …

LVI: Hijacking transient execution through microarchitectural load value injection

J Van Bulck, D Moghimi, M Schwarz… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
The recent Spectre attack first showed how to inject incorrect branch targets into a victim
domain by poisoning microarchitectural branch prediction history. In this paper, we …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

StateAFL: Greybox fuzzing for stateful network servers

R Natella - Empirical Software Engineering, 2022 - Springer
Fuzzing network servers is a technical challenge, since the behavior of the target server
depends on its state over a sequence of multiple messages. Existing solutions are costly …

Nyx-net: network fuzzing with incremental snapshots

S Schumilo, C Aschermann, A Jemmett… - Proceedings of the …, 2022 - dl.acm.org
Coverage-guided fuzz testing (" fuzzing") has become mainstream and we have observed
lots of progress in this research area recently. However, it is still challenging to efficiently test …

Llm4decompile: Decompiling binary code with large language models

H Tan, Q Luo, J Li, Y Zhang - arxiv preprint arxiv:2403.05286, 2024 - arxiv.org
Decompilation aims to convert binary code to high-level source code, but traditional tools
like Ghidra often produce results that are difficult to read and execute. Motivated by the …

[PDF][PDF] Degpt: Optimizing decompiler output with llm

P Hu, R Liang, K Chen - Proceedings 2024 Network and …, 2024 - ndss-symposium.org
Reverse engineering is essential in malware analysis, vulnerability discovery, etc.
Decompilers assist the reverse engineers by lifting the assembly to the high-level …