Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of 2019
DOI: 10.1145/3338906.3338975
|View full text |Cite
|
Sign up to set email alerts
|

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
32
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 70 publications
(32 citation statements)
references
References 34 publications
0
32
0
Order By: Relevance
“…A test case that has more chances to cover OSs with mutations should be assigned with more energy. Existing coverage-based fuzzers (e.g., AFL) usually calculate the energy for the selected test case as follows [23]:…”
Section: Power Schedulingmentioning
confidence: 99%
See 1 more Smart Citation
“…A test case that has more chances to cover OSs with mutations should be assigned with more energy. Existing coverage-based fuzzers (e.g., AFL) usually calculate the energy for the selected test case as follows [23]:…”
Section: Power Schedulingmentioning
confidence: 99%
“…Recently, lots of greybox fuzzing techniques have been proposed to detect various types of bugs [1, 4, 6, 9, 16, 21-23, 25, 28, 29, 31, 46]. These techniques either enhance the different components of the greybox fuzzer [4,16,[21][22][23]25] or combine greybox fuzzing with other techniques such as static analysis [23,29], symbolic execution [31,46], or taint analysis [9,28]. These techniques are general purpose techniques which are not designed to detect a specific type of bugs with more effectiveness.…”
Section: Related Workmentioning
confidence: 99%
“…MOpt [25] uses a customized Particle Swarm Optimization (PSO) algorithm to optimize the mutation operation scheduler. Cerebro [23] utilizes various factors such as code complexity, coverage, and execution time to improve seed scheduling strategy. AFLGO [11] and Hawkeye [12] leverage seed [22] and Laf-intel [5] split magic bytes to make them as weak constraint with extra implemetation.…”
Section: Related Workmentioning
confidence: 99%
“…In this chapter, we demonstrate the detailed design of FOT and breifly discuss the extensions(namely, Hawkeye [1] and Cerebro [37]) built on top of FOT. By the end of this chapter, we also discuss the differences between FOT and other greybox fuzzing frameworks 1 .…”
Section: Chapter 3 Fot: a Versatile Configurable Extensible Fuzzingmentioning
confidence: 99%