Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security 2019
DOI: 10.1145/3319535.3363275
|View full text |Cite
|
Sign up to set email alerts
|

Poster

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 3 publications
0
15
0
Order By: Relevance
“…This technique is more systematic for the static analysis of a target program than other techniques and is accessible from multiple methods. Typical white-box fuzzers are scalable automated guided execution (SAGE) [25], FuSeBMC [26], T-fuzz [27], Driller [28], and DrillerGo [29]. White-box fuzzing can evaluate all possible paths inside the program, but it has a high overhead.…”
Section: White-box Fuzzingmentioning
confidence: 99%
“…This technique is more systematic for the static analysis of a target program than other techniques and is accessible from multiple methods. Typical white-box fuzzers are scalable automated guided execution (SAGE) [25], FuSeBMC [26], T-fuzz [27], Driller [28], and DrillerGo [29]. White-box fuzzing can evaluate all possible paths inside the program, but it has a high overhead.…”
Section: White-box Fuzzingmentioning
confidence: 99%
“…In fact, DGF is in demand because 45.1% of the usual bug reports cannot be reproduced due to missing information and user privacy violations [117]. TortoiseFuzz [27] and DrillerGo [28] utilize CVE vulnerability descriptions as target information, while UAFuzz [24] extracts target information from bug traces, both of which are suitable for this scenario. Knowledge integration.…”
Section: Application Of Dgfmentioning
confidence: 99%
“…Meanwhile, CVE information, commit changes, binary diffing techniques, and tools such as UBSan and AddressSanitizer, are adopted to label various potential vulnerable code regions. Examples include DrillerGo [28], TortoiseFuzz [27], AFLChurn [26], GREY-HOUND [15], DeltaFuzz [25], 1DVUL [23], SAVIOR [100] and HDR-Fuzz [101]. • The fuzzing process has been enhanced with various approaches, such as using data-flow analysis and semantic analysis to generate valid input, using symbolic execution to pass complex constraints.…”
Section: Overviewmentioning
confidence: 99%
See 2 more Smart Citations