Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering 2020
DOI: 10.1145/3377811.3380334
|View full text |Cite
|
Sign up to set email alerts
|

sFuzz

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 150 publications
(46 citation statements)
references
References 18 publications
0
46
0
Order By: Relevance
“…Outside of ICSs and CPSs, many fuzzers are available for testing software, e.g. [39]- [43]. A common approach to improve test generation is to specify the class of valid inputs as a context-free grammar (CFG) [44], [45].…”
Section: Related Workmentioning
confidence: 99%
“…Outside of ICSs and CPSs, many fuzzers are available for testing software, e.g. [39]- [43]. A common approach to improve test generation is to specify the class of valid inputs as a context-free grammar (CFG) [44], [45].…”
Section: Related Workmentioning
confidence: 99%
“…It first converts the input to smart contracts into a C++ program via the Abstract Syntax Tree (AST) or CFG and generates random inputs to perform the fuzzing. sFuzz [4] employs an efficient, lightweight, adaptive strategy for selecting seeds to improve the fuzzing method based on random input generator [5]. EthPloit [34] adopts static taint analysis to generate exploittargeted transaction sequences.…”
Section: Detectors Using Fuzz Testingmentioning
confidence: 99%
“…Thus, other researchers performed empirical studies as shown in Table 2 to evaluate and compare the smart contract vulnerability detectors. 2020 [11] 2020 [16] 2021 [10] 2021 [19] SmartCheck [13] ✓ ✓ Oyente [2] ✓ ✓ ✓ ✓ ZEUS [20] ✓ Securify [3] ✓ ✓ ✓ Mythril [12] ✓ ✓ ✓ Slither [14] ✓ ✓ Manticore [15] ✓ ✓ MAIAN [17] ✓ ✓ Orisis [18] ✓ ✓ HONEYBADGER [9] ✓ ContractFuzzer [5] ✓ TEETHER [21] ✓ MadMax [22] ✓ sFuzz [4] ✓ Ghaleb et al [11] proposed SolidiFI to evaluate six static vulnerability detectors [2], [3], [12], [13], [14], [15] using a dataset with injected vulnerabilities. Experiment results on a set of 50 contracts injected with 9,369 distinct vulnerabilities show that the evaluated detectors do not detect several instances of vulnerabilities despite their claims of being able to detect such vulnerabilities.…”
Section: Empirical Evaluations Of Vulnerability Detectorsmentioning
confidence: 99%
See 2 more Smart Citations