2018
DOI: 10.1109/tr.2018.2834476
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzing: State of the Art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
75
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 157 publications
(76 citation statements)
references
References 117 publications
0
75
0
1
Order By: Relevance
“…Fuzzing [ 1 , 2 , 6 , 31 ] now is a widely used technique to discover vulnerabilities in programs. The basic idea of fuzzing is to feed different and even abnormal inputs into a PUT, and keep monitoring its status to check if the program is crashed or misbehaving [ 1 ].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Fuzzing [ 1 , 2 , 6 , 31 ] now is a widely used technique to discover vulnerabilities in programs. The basic idea of fuzzing is to feed different and even abnormal inputs into a PUT, and keep monitoring its status to check if the program is crashed or misbehaving [ 1 ].…”
Section: Related Workmentioning
confidence: 99%
“…The basic idea of fuzzing is to feed different and even abnormal inputs into a PUT, and keep monitoring its status to check if the program is crashed or misbehaving [ 1 ]. Fuzzers could be classified into three categories: blackbox, greybox and whitebox [ 2 , 6 ]. Blackbox fuzzers [ 7 , 8 ] could only monitor the input/output of a PUT, and some of them like Peach may know the structure of inputs [ 8 ].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Binary vulnerability detection techniques can be roughly divided into two categories: static analysis and dynamic analysis [1], [2]. The dynamic analysis, such as fuzzing [3], [4] and dynamic taint analysis [5], [6], examines program behavior while it is running in a given environment. Dynamic binary analysis allows you explore individual paths which makes it very precise but at the expense of less code coverage.…”
Section: Introductionmentioning
confidence: 99%