Results 11 to 20 of about 22,224 (372)

Harvey: a greybox fuzzer for smart contracts [PDF]

open access: green, 2020
We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation approach that effectively detects bugs and security vulnerabilities.
Valentin Wüstholz, Maria Christakis
openalex   +3 more sources

Automatically Seed Corpus and Fuzzing Executables Generation Using Test Framework

open access: yesIEEE Access, 2022
Fuzzing is widely utilized as a practical test method to determine unknown vulnerabilities in software. Although fuzzing shows excellent results for code coverage and crash count, it is not easy to apply these effects to library fuzzing. A library cannot
Sanghoon Jeon   +3 more
doaj   +1 more source

Efficient ECU Analysis Technology Through Structure-Aware CAN Fuzzing

open access: yesIEEE Access, 2022
Modern vehicles are equipped with a number of electronic control units (ECUs), which control vehicles efficiently by communicating with each other through the controller area network (CAN).
Hyunghoon Kim   +4 more
doaj   +1 more source

Optimizing IoT Web Fuzzing by Firmware Infomation Mining

open access: yesApplied Sciences, 2022
IoT web fuzzing is an effective way to detect security flaws in IoT devices. However, without enough information of the tested targets, IoT web fuzzing is often blind and inefficient.
Yifei Gao   +5 more
doaj   +1 more source

Testcase Filtering Method Based on QRNN for Network Protocol Fuzzing [PDF]

open access: yesJisuanji kexue, 2022
At present,targets of network protocol fuzzing tend to be large protocol entities,and traditional testcase filtering me-thods are mainly based on the running status information of the test object.The larger the test object,the longer it takes to execute ...
HU Zhi-hao, PAN Zu-lie
doaj   +1 more source

Learn&Fuzz: Machine learning for input fuzzing [PDF]

open access: yes2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2017
Fuzzing consists of repeatedly testing an application with modified, or fuzzed, inputs with the goal of finding security vulnerabilities in input-parsing code. In this paper, we show how to automate the generation of an input grammar suitable for input fuzzing using sample inputs and neural-network-based statistical machine-learning techniques.
Godefroid, Patrice   +2 more
openaire   +2 more sources

PGNFuzz:Pointer Generation Network Based Fuzzing Framework for Industry Control Protocols [PDF]

open access: yesJisuanji kexue, 2022
Industrial security issues have always been an important and urgent issue globally.Industrial control protocols are widely used in the communication between industrial control system(ICS) components.Their security is related to the safe and stable ...
WANG Tian-yuan, WU Shu-hong, LI Zhao-ji, XIN Hao-guang, LI Xuan, CHEN Yong-le
doaj   +1 more source

TAEF: A Task Allocation-Based Ensemble Fuzzing Framework for Optimizing the Advantages of Heterogeneous Fuzzers

open access: yesApplied Sciences, 2023
Ensemble fuzzing in parallel with heterogeneous fuzzers has been proposed to leverage the advantages of diverse fuzzers and improve testing efficiency.
Yutao Sun, Xianghua Xu
doaj   +1 more source

Practical Anti-Fuzzing Techniques With Performance Optimization

open access: yesIEEE Open Journal of the Computer Society, 2023
Fuzzing, an automated software testing technique, has achieved remarkable success in recent years, aiding developers in identifying vulnerabilities. However, fuzzing can also be exploited by attackers to discover zero-day vulnerabilities. To counter this
Zhengxiang Zhou, Cong Wang
doaj   +1 more source

Exploratory Review of Hybrid Fuzzing for Automated Vulnerability Detection

open access: yesIEEE Access, 2021
Recently, software testing has become a significant component of information security. The most reliable technique for automated software testing is a fuzzing tool that feeds programs with random test-input and detects software vulnerabilities that are ...
Fayozbek Rustamov   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy