Results 321 to 330 of about 22,224 (372)
Some of the next articles are maybe not open access.
Coverage-Based Greybox Fuzzing as Markov Chain
IEEE Transactions on Software Engineering, 2016Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis. A new test is generated by slightly mutating a seed input.
Marcel Böhme +2 more
semanticscholar +1 more source
Debugger-driven Embedded Fuzzing
2022 IEEE Conference on Software Testing, Verification and Validation (ICST), 2022Embedded Systems – the hidden computers in our lives – are deployed in the billionths and are already in the focus of attackers. They pose security risks when not tested and maintained thoroughly. In recent years, fuzzing has become a promising technique for automated security testing of programs, which can generate tons of test inputs for a program ...
openaire +1 more source
Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL Transfer
International Conference on Software EngineeringEffective DBMS fuzzing relies on high-quality initial seeds, which serve as the starting point for mutation. These initial seeds should incorporate various DBMS features to explore the state space thoroughly.
Jingzhou Fu +3 more
semanticscholar +1 more source
IEEE Symposium on Security and Privacy
Directed fuzzing demonstrates the potential to reproduce bug reports, verify patches, and debug vulnerabilities. State-of-the-art directed fuzzers prioritize inputs that are more likely to trigger the target vulnerability or filter irrelevant inputs ...
Heqing Huang +3 more
semanticscholar +1 more source
Directed fuzzing demonstrates the potential to reproduce bug reports, verify patches, and debug vulnerabilities. State-of-the-art directed fuzzers prioritize inputs that are more likely to trigger the target vulnerability or filter irrelevant inputs ...
Heqing Huang +3 more
semanticscholar +1 more source
AFGen: Whole-Function Fuzzing for Applications and Libraries
IEEE Symposium on Security and PrivacyFuzzing technology has been widely used to discover vulnerabilities, but existing fuzzing techniques still cannot cover and explore all functions in an application or a library. The works that automatically generate fuzzing harnesses for API functions of
Yuwei Liu +4 more
semanticscholar +1 more source
Beyond Random Inputs: A Novel ML-Based Hardware Fuzzing
Design, Automation and Test in EuropeModern computing systems heavily rely on hardware as the root of trust. However, their increasing complexity has given rise to security-critical vulnerabilities that cross-layer attacks can exploit.
Mohamadreza Rostami +5 more
semanticscholar +1 more source
Logos: Log Guided Fuzzing for Protocol Implementations
International Symposium on Software Testing and AnalysisNetwork protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations.
Feifan Wu +7 more
semanticscholar +1 more source
On the Challenges of Fuzzing Techniques via Large Language Models
2025 IEEE International Conference on Software Services Engineering (SSE)In the modern era where software plays a pivotal role, software security and vulnerability analysis are essential for secure software development. Fuzzing test, as an efficient and tra-ditional software testing method, has been widely adopted across ...
Linghan Huang +3 more
semanticscholar +1 more source
Fuzzing MLIR Compiler Infrastructure via Operation Dependency Analysis
International Symposium on Software Testing and AnalysisMLIR (Multi-Level Intermediate Representation) compiler infrastructure has gained widespread popularity in recent years. It introduces dialects to accommodate various levels of abstraction within the representation.
Chenyao Suo +5 more
semanticscholar +1 more source
The Fuzz Odyssey: A Survey on Hardware Fuzzing Frameworks for Hardware Design Verification
ACM Great Lakes Symposium on VLSIHardware Security is at stake driven by the growing complexity and integration of processors, SoCs, and diverse third-party intellectual property (IP) hardware, all geared toward delivering advanced solutions.
Raghul Saravanan +1 more
semanticscholar +1 more source

