Results 311 to 320 of about 22,224 (372)
Some of the next articles are maybe not open access.
Fuzzing JavaScript Interpreters with Coverage-Guided Reinforcement Learning for LLM-Based Mutation
International Symposium on Software Testing and AnalysisJavaScript interpreters, crucial for modern web browsers, require an effective fuzzing method to identify security-related bugs. However, the strict grammatical requirements for input present significant challenges.
Jueon Eom, Seyeon Jeong, Taekyoung Kwon
semanticscholar +1 more source
Titan : Efficient Multi-target Directed Greybox Fuzzing
IEEE Symposium on Security and PrivacyModern directed fuzzing often faces scalability issues when analyzing multiple targets in a program simultaneously. We observe that the root cause is that directed fuzzers are unaware of the correlations among the targets, thereby could degenerate into a
Heqing Huang +4 more
semanticscholar +1 more source
International Conference on Automated Software Engineering
The wide adoption of open source third-party libraries can propagate vulnerabilities that originally exist in third-party libraries through dependency chains to downstream projects.
Zhuotong Zhou +5 more
semanticscholar +1 more source
The wide adoption of open source third-party libraries can propagate vulnerabilities that originally exist in third-party libraries through dependency chains to downstream projects.
Zhuotong Zhou +5 more
semanticscholar +1 more source
WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors
USENIX Security SymposiumTiming vulnerabilities in processors have emerged as a potent threat. As processors are the foundation of any computing system, identifying these flaws is imperative. Recently fuzzing techniques, traditionally used for detecting software vulnerabilities,
Pallavi Borkar +7 more
semanticscholar +1 more source
LLM4Fuzz: Guided Fuzzing of Smart Contracts with Large Language Models
arXiv.orgAs blockchain platforms grow exponentially, millions of lines of smart contract code are being deployed to manage extensive digital assets. However, vulnerabilities in this mission-critical code have led to significant exploitations and asset losses ...
Chaofan Shou +3 more
semanticscholar +1 more source
ACM Computing Surveys
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities within their implementations pose significant security threats.
Xiaohan Zhang +8 more
semanticscholar +1 more source
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities within their implementations pose significant security threats.
Xiaohan Zhang +8 more
semanticscholar +1 more source
RPG: Rust Library Fuzzing with Pool-based Fuzz Target Generation and Generic Support
International Conference on Software EngineeringRust libraries are ubiquitous in Rust-based software development. Guaranteeing their correctness and reliability requires thorough analysis and testing.
Zhiwu Xu +5 more
semanticscholar +1 more source
When Fuzzing Meets LLMs: Challenges and Opportunities
SIGSOFT FSE CompanionFuzzing, a widely-used technique for bug detection, has seen advancements through Large Language Models (LLMs). Despite their potential, LLMs face specific challenges in fuzzing. In this paper, we identified five major challenges of LLM-assisted fuzzing.
Yu Jiang +10 more
semanticscholar +1 more source
Labrador: Response Guided Directed Fuzzing for Black-box IoT Devices
IEEE Symposium on Security and PrivacyFuzzing is a popular solution to finding vulnerabilities in software including IoT firmware. However, due to the challenges of emulating or rehosting firmware, some IoT devices (e.g., enterprise-level devices) can only be fuzzed in a black-box manner ...
Hangtian Liu +6 more
semanticscholar +1 more source
LLAMAFUZZ: Large Language Model Enhanced Greybox Fuzzing
arXiv.orgGreybox fuzzing has achieved success in revealing bugs and vulnerabilities in programs. However, randomized mutation strategies have limited the fuzzer's performance on structured data.
Hongxiang Zhang +3 more
semanticscholar +1 more source

