A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

Sok: Prudent evaluation practices for fuzzing

M Schloegel, N Bars, N Schiller… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …

{FISHFUZZ}: Catch deeper bugs by throwing larger nets

H Zheng, J Zhang, Y Huang, Z Ren, H Wang… - 32nd USENIX Security …, 2023 - usenix.org
Fuzzers effectively explore programs to discover bugs. Greybox fuzzers mutate seed inputs
and observe their execution. Whenever a seed reaches new behavior (eg, new code or …

Llm4fuzz: Guided fuzzing of smart contracts with large language models

C Shou, J Liu, D Lu, K Sen - arxiv preprint arxiv:2401.11108, 2024 - arxiv.org
As blockchain platforms grow exponentially, millions of lines of smart contract code are
being deployed to manage extensive digital assets. However, vulnerabilities in this mission …

Mc2: Rigorous and efficient directed greybox fuzzing

A Shah, D She, S Sadhu, K Singal, P Coffman… - Proceedings of the …, 2022 - dl.acm.org
Directed greybox fuzzing is a popular technique for targeted software testing that seeks to
find inputs that reach a set of target sites in a program. Most existing directed greybox …

Sjfuzz: Seed and mutator scheduling for jvm fuzzing

M Wu, Y Ouyang, M Lu, J Chen, Y Zhao, H Cui… - Proceedings of the 31st …, 2023 - dl.acm.org
While the Java Virtual Machine (JVM) plays a vital role in ensuring correct executions of
Java applications, testing JVMs via generating and running class files on them can be rather …

Fuzztruction: using fault injection-based fuzzing to leverage implicit domain knowledge

N Bars, M Schloegel, T Scharnowski… - 32nd USENIX Security …, 2023 - usenix.org
Today's digital communication relies on complex protocols and specifications for
exchanging structured messages and data. Communication naturally involves two …

Enhancing coverage-guided fuzzing via phantom program

M Wu, K Chen, Q Luo, J **ang, J Qi, J Chen… - Proceedings of the 31st …, 2023 - dl.acm.org
For coverage-guided fuzzers, many of their adopted seeds are usually underused by
exploring limited program states since essentially all their executions have to abide by …

{AIFORE}: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

J Shi, Z Wang, Z Feng, Y Lan, S Qin, W You… - 32nd USENIX Security …, 2023 - usenix.org
Knowledge of a program's input format is essential for effective input generation in fuzzing.
Automated input format reverse engineering represents an attractive but challenging …

Sok: Where to fuzz? assessing target selection methods in directed fuzzing

F Weissberg, J Möller, T Ganz, E Imgrund… - Proceedings of the 19th …, 2024 - dl.acm.org
A common paradigm for improving fuzzing performance is to focus on selected regions of a
program rather than its entirety. While previous work has largely explored how these …