2022
DOI: 10.1007/s11390-021-1663-7
|View full text |Cite
|
Sign up to set email alerts
|

DeltaFuzz: Historical Version Information Guided Fuzz Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 46 publications
0
8
0
Order By: Relevance
“…In this study, we use vulnerability reproduction time and change point coverage time as indicators to confirm whether the testing resources are focussed on the change points and the change impact areas. These indicators are also commonly used by other fuzz testing works [19,28].…”
Section: Threates To Validitymentioning
confidence: 99%
See 1 more Smart Citation
“…In this study, we use vulnerability reproduction time and change point coverage time as indicators to confirm whether the testing resources are focussed on the change points and the change impact areas. These indicators are also commonly used by other fuzz testing works [19,28].…”
Section: Threates To Validitymentioning
confidence: 99%
“…Experiments show that BEACON can reproduce vulnerabilities faster than other tools, such as AFLGo and Hawkeye. Zhang et al implemented DeltaFuzz [28] to perform change impact analysis before fuzz testing begins and calculate the fitness of the seed test case according to its execution path. Testing resources will be allocated to the seeds with higher fitness.…”
Section: Directed Fuzz Testingmentioning
confidence: 99%
“…Thus, directed fuzzing towards problematic changes or patches has a higher chance of exposing bugs. For example, DeltaFuzz [25] and AFLChurn [26] are designed for regression testing. SemFuzz [22] uses code changes from git commit logs.…”
Section: Application Of Dgfmentioning
confidence: 99%
“…Meanwhile, CVE information, commit changes, binary diffing techniques, and tools such as UBSan and AddressSanitizer, are adopted to label various potential vulnerable code regions. Examples include DrillerGo [28], TortoiseFuzz [27], AFLChurn [26], GREYHOUND [15], DeltaFuzz [25], 1DVUL [23], SAVIOR [100] and HDR‐Fuzz [101]. The fuzzing process has been enhanced with various approaches, such as using data‐flow analysis and semantic analysis to generate valid input, using symbolic execution to pass complex constraints.…”
Section: Research Progress On Dgfmentioning
confidence: 99%
See 1 more Smart Citation