Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y **ang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

Software vulnerability detection using deep neural networks: a survey

G Lin, S Wen, QL Han, J Zhang… - Proceedings of the …, 2020 - ieeexplore.ieee.org
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …

Shadewatcher: Recommendation-guided cyber threat analysis using system audit records

J Zengy, X Wang, J Liu, Y Chen, Z Liang… - … IEEE symposium on …, 2022 - ieeexplore.ieee.org
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Transformer-based language models for software vulnerability detection

C Thapa, SI Jang, ME Ahmed, S Camtepe… - Proceedings of the 38th …, 2022 - dl.acm.org
The large transformer-based language models demonstrate excellent performance in
natural language processing. By considering the transferability of the knowledge gained by …

Directed greybox fuzzing

M Böhme, VT Pham, MD Nguyen… - Proceedings of the 2017 …, 2017 - dl.acm.org
Existing Greybox Fuzzers (GF) cannot be effectively directed, for instance, towards
problematic changes or patches, towards critical system calls or dangerous locations, or …

{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture

P Borrello, A Kogler, M Schwarzl, M Lipp… - 31st USENIX Security …, 2022 - usenix.org
CPU vulnerabilities undermine the security guarantees provided by software-and hardware-
security improvements. While the discovery of transient-execution attacks increased the …

Modeling and discovering vulnerabilities with code property graphs

F Yamaguchi, N Golde, D Arp… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …

Lava: Large-scale automated vulnerability addition

B Dolan-Gavitt, P Hulin, E Kirda, T Leek… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Work on automating vulnerability discovery has long been hampered by a shortage of
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …