2018
DOI: 10.1186/s42400-018-0002-y
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzing: a survey

Abstract: Security vulnerability is one of the root causes of cyber-security threats. To discover vulnerabilities and fix them in advance, researchers have proposed several techniques, among which fuzzing is the most widely used one. In recent years, fuzzing solutions, like AFL, have made great improvements in vulnerability discovery. This paper presents a summary of the recent advances, analyzes how they improve the fuzzing process, and sheds light on future work in fuzzing. Firstly, we discuss the reason why fuzzing i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
100
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 193 publications
(102 citation statements)
references
References 22 publications
0
100
0
2
Order By: Relevance
“…In this section, we introduce some of the presented fuzzing techniques. For a more comprehensive study on fuzzing techniques, please refer to recent surveys such as Chen et al [10], Li et al [32], and Manès et al [37].…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we introduce some of the presented fuzzing techniques. For a more comprehensive study on fuzzing techniques, please refer to recent surveys such as Chen et al [10], Li et al [32], and Manès et al [37].…”
Section: Related Workmentioning
confidence: 99%
“…A popular method in SBST is fuzzing [35]. Fuzzing is a technique which attempts to crash a program by feeding it randomly mutated inputs [36].…”
Section: Related Workmentioning
confidence: 99%
“…Based on how inputs are generated, fuzzing techniques can be categorized into two types: generation-based fuzzing and mutation-based fuzzing [5].…”
Section: Fuzzingmentioning
confidence: 99%