Results 321 to 330 of about 22,224 (372)
Some of the next articles are maybe not open access.

Coverage-Based Greybox Fuzzing as Markov Chain

IEEE Transactions on Software Engineering, 2016
Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis. A new test is generated by slightly mutating a seed input.
Marcel Böhme   +2 more
semanticscholar   +1 more source

Debugger-driven Embedded Fuzzing

2022 IEEE Conference on Software Testing, Verification and Validation (ICST), 2022
Embedded Systems – the hidden computers in our lives – are deployed in the billionths and are already in the focus of attackers. They pose security risks when not tested and maintained thoroughly. In recent years, fuzzing has become a promising technique for automated security testing of programs, which can generate tons of test inputs for a program ...
openaire   +1 more source

Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL Transfer

International Conference on Software Engineering
Effective DBMS fuzzing relies on high-quality initial seeds, which serve as the starting point for mutation. These initial seeds should incorporate various DBMS features to explore the state space thoroughly.
Jingzhou Fu   +3 more
semanticscholar   +1 more source

Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference

IEEE Symposium on Security and Privacy
Directed fuzzing demonstrates the potential to reproduce bug reports, verify patches, and debug vulnerabilities. State-of-the-art directed fuzzers prioritize inputs that are more likely to trigger the target vulnerability or filter irrelevant inputs ...
Heqing Huang   +3 more
semanticscholar   +1 more source

AFGen: Whole-Function Fuzzing for Applications and Libraries

IEEE Symposium on Security and Privacy
Fuzzing technology has been widely used to discover vulnerabilities, but existing fuzzing techniques still cannot cover and explore all functions in an application or a library. The works that automatically generate fuzzing harnesses for API functions of
Yuwei Liu   +4 more
semanticscholar   +1 more source

Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing

Design, Automation and Test in Europe
Modern computing systems heavily rely on hardware as the root of trust. However, their increasing complexity has given rise to security-critical vulnerabilities that cross-layer attacks can exploit.
Mohamadreza Rostami   +5 more
semanticscholar   +1 more source

Logos: Log Guided Fuzzing for Protocol Implementations

International Symposium on Software Testing and Analysis
Network protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations.
Feifan Wu   +7 more
semanticscholar   +1 more source

On the Challenges of Fuzzing Techniques via Large Language Models

2025 IEEE International Conference on Software Services Engineering (SSE)
In the modern era where software plays a pivotal role, software security and vulnerability analysis are essential for secure software development. Fuzzing test, as an efficient and tra-ditional software testing method, has been widely adopted across ...
Linghan Huang   +3 more
semanticscholar   +1 more source

Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis

International Symposium on Software Testing and Analysis
MLIR (Multi-Level Intermediate Representation) compiler infrastructure has gained widespread popularity in recent years. It introduces dialects to accommodate various levels of abstraction within the representation.
Chenyao Suo   +5 more
semanticscholar   +1 more source

The Fuzz Odyssey: A Survey on Hardware Fuzzing Frameworks for Hardware Design Verification

ACM Great Lakes Symposium on VLSI
Hardware Security is at stake driven by the growing complexity and integration of processors, SoCs, and diverse third-party intellectual property (IP) hardware, all geared toward delivering advanced solutions.
Raghul Saravanan   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy