Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering 2015
DOI: 10.1145/2786805.2786844
|View full text |Cite
|
Sign up to set email alerts
|

Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 16 publications
0
27
0
Order By: Relevance
“…Several other works change mutate to be aware of taint-level observations about the program behavior, specifically mutating inputs that are used by the program [8,10,33,44]. Where other fuzzers use pre-defined data mutation strategies like bit flipping or rand replacement, MutaGen uses fragments of the program under test that parse or manipulate the input as mutators through dynamic slicing [29]. SDF uses properties of the seeds themselves to guide mutation [35].…”
Section: Recent Advances In Fuzzingmentioning
confidence: 99%
See 1 more Smart Citation
“…Several other works change mutate to be aware of taint-level observations about the program behavior, specifically mutating inputs that are used by the program [8,10,33,44]. Where other fuzzers use pre-defined data mutation strategies like bit flipping or rand replacement, MutaGen uses fragments of the program under test that parse or manipulate the input as mutators through dynamic slicing [29]. SDF uses properties of the seeds themselves to guide mutation [35].…”
Section: Recent Advances In Fuzzingmentioning
confidence: 99%
“…Every trial was allowed to run for 24 hours, and we generally measured at least 30 trials per configuration. We also considered a variety of seed files, including the empty file, paper benchmarks baseline trials variance crash coverage seed timeout MAYHEM [8] R (29) [44] O means other baseline used by no more than 1 paper. Trials: number of trials.…”
Section: Platform and Configurationmentioning
confidence: 99%
“…Driller [58] combines fuzzing and concolic execution to discover deep bugs. Kargén and Shahmehri [37] perform mutations on the machine code of the generating programs instead of directly on a test input in order to leverage the information about the input format encoded in the generating programs. In summary, these fuzzing techniques target programs that process compact or unstructured inputs, which become less effective for programs that process structured inputs.…”
Section: Related Workmentioning
confidence: 99%
“…It even requires huge extra work for dynamic methods to generate test cases in order to cover the target function. Unfortunately, code coverage is still an issue for dynamic analysis of binaries [24].…”
Section: A Motivating Examplementioning
confidence: 99%