2018
DOI: 10.1109/access.2018.2851237
|View full text |Cite
|
Sign up to set email alerts
|

PTfuzz: Guided Fuzzing With Processor Trace Feedback

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
41
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 57 publications
(41 citation statements)
references
References 16 publications
0
41
0
Order By: Relevance
“…For white-box (source-available) binaries, code coverage is measured through instrumentation inserted at compile-time [4], [5], [6]. For black-box (sourceunavailable) binaries, it is generally measured through instrumentation inserted dynamically [5], [7] or statically through binary rewriting [10], or through instrumentation-free hardwareassisted tracing [11], [12], [4].…”
Section: Matthew Hicks Virginia Tech Mdhicks2@vtedumentioning
confidence: 99%
See 1 more Smart Citation
“…For white-box (source-available) binaries, code coverage is measured through instrumentation inserted at compile-time [4], [5], [6]. For black-box (sourceunavailable) binaries, it is generally measured through instrumentation inserted dynamically [5], [7] or statically through binary rewriting [10], or through instrumentation-free hardwareassisted tracing [11], [12], [4].…”
Section: Matthew Hicks Virginia Tech Mdhicks2@vtedumentioning
confidence: 99%
“…6) Return to step 2 and repeat. Coverage-guided fuzzers trace code coverage during execution via binary instrumentation [5], [6], [4], system emulation [5], [11], [24], or hardware-assisted mechanisms [11], [4], [12]. All coverage-guided fuzzers are based on one of three metrics of code coverage: basic blocks, basic block edges, or basic block paths.…”
Section: B Coverage-guided Fuzzingmentioning
confidence: 99%
“…Our evaluation on PTFuzzer shows much worse performance than the results reported in[38]. We believe this is mainly because our benchmarks have higher complexities and the seeds we use trigger deeper execution.…”
mentioning
confidence: 60%
“…7.1.2 Hardware-assisted Fuzzing. Motivated by the inefficiency of dynamic instrumentation based fuzzing systems, hardware-assisted fuzzing techniques were proposed recently [38]. Similar to PTrix, by leveraging the newly available hardware tracing component-Intel PT [1], Honggfuzz [5] and kAFL [29] efficiently collect the execution trace from the target program.…”
Section: Binary Compatible Coverage-based Fuzzingmentioning
confidence: 99%
“…Companies such as Google and Apple have deployed fuzzing tools to discover vulnerabilities, and researchers have proposed various fuzzing techniques [4,6,7,12,18,29,33,43,45,47,56,60,61]. Specifically, coverageguided fuzzing [4,6,12,18,33,43,45,56,61] has been actively studied in recent years. In contrast to generational fuzzing, which generates inputs based on given format specifications [2,3,16], coverage-guided fuzzing does not require knowledge such as input format or program specifications.…”
Section: Introductionmentioning
confidence: 99%