2020 IEEE Symposium on Security and Privacy (SP) 2020
DOI: 10.1109/sp40000.2020.00117
|View full text |Cite
|
Sign up to set email alerts
|

Ijon: Exploring Deep State Spaces via Fuzzing

Abstract: Fig. 1: AFL and AFL + IJON trying to defeat Bowser in Super Mario Bros. (Level 3-4). The lines are the traces of all runs found by the fuzzer.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
53
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(59 citation statements)
references
References 34 publications
1
53
0
Order By: Relevance
“…Across many cycles, AFL learns to produce interesting inputs as it expands the code coverage map. Although simple, this strategy is surprisingly successful: several recent advanced fuzzers [4,9,14] follow the same high-level process. Overall, AFL-style, greybox fuzzing has proven extremely successful on Linux systems.…”
Section: Background: Why Harness Generation?mentioning
confidence: 99%
See 2 more Smart Citations
“…Across many cycles, AFL learns to produce interesting inputs as it expands the code coverage map. Although simple, this strategy is surprisingly successful: several recent advanced fuzzers [4,9,14] follow the same high-level process. Overall, AFL-style, greybox fuzzing has proven extremely successful on Linux systems.…”
Section: Background: Why Harness Generation?mentioning
confidence: 99%
“…Although most recent research efforts focus on improving fuzzing Linux applications [4,9,14,22,39,50,69], Windows programs are also vulnerable to memory safety issues. Past researchers have uncovered many vulnerabilities by performing a manual audit [43].…”
Section: Background: Why Harness Generation?mentioning
confidence: 99%
See 1 more Smart Citation
“…Greybox fuzzing (mainly coverage-based) has already been widely used in the security industry [3,10]. It is also a hot research topic; many fuzzers like AFLFast [5], CollAFL [11], Angora [12], QSYM [13], MOPT [14], and IJON [16] are proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Though coverage-based fuzzing usually does not need sophisticated program analysis or the grammar of program input like whitebox fuzzing [9], it is shown to be able to gradually exercise different parts of the program and discover many vulnerabilities [3]. Now, coverage-based fuzzing is being both used by the security industry [3,10] and researched by the academia [5,[11][12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%