Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23404
|View full text |Cite
|
Sign up to set email alerts
|

VUzzer: Application-aware Evolutionary Fuzzing

Abstract: Fuzzing is an effective software testing technique to find bugs. Given the size and complexity of real-world applications, modern fuzzers tend to be either scalable, but not effective in exploring bugs that lie deeper in the execution, or capable of penetrating deeper in the application, but not scalable. In this paper, we present an application-aware evolutionary fuzzing strategy that does not require any prior knowledge of the application or input format. In order to maximize coverage and explore deeper path… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
484
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 450 publications
(485 citation statements)
references
References 24 publications
(43 reference statements)
0
484
0
1
Order By: Relevance
“…Control flow and data flow features have been used to guide the fuzzing process [4] , while semantic features are rarely considered. We observe that some program operations are more likely to fail the program or introduce a vulnerability, while other operations are not.…”
Section: Semantic Featuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Control flow and data flow features have been used to guide the fuzzing process [4] , while semantic features are rarely considered. We observe that some program operations are more likely to fail the program or introduce a vulnerability, while other operations are not.…”
Section: Semantic Featuresmentioning
confidence: 99%
“…Previous work has proved that better code coverage results in higher probability of finding bugs [5] . Thus, state-of-the-art fuzzers like AFL [7] and Vuzzer [4] employ a coverage-based fuzzing strategy. More specifically, program control flow is interpreted as a graph, and vertices are used to represent basic blocks, edges are used to represent transitions between the basic blocks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The fuzzing discipline has evolved from its very beginnings [9] in 1990 to an active area of research providing advanced testing frameworks [1,2,11,14,15]. Beyond generational (format-aware) and mutational (format-blind) fuzzers we can generally distinguish between feedback-driven and black-box fuzzers.…”
Section: Related Workmentioning
confidence: 99%
“…Recent research focuses on advancing single fuzzers [2,11,15] and optimal scheduling of fuzzers, test case corpora, and targets during fuzzing campaigns [19]. But how can we optimize the interaction between fuzzers?…”
mentioning
confidence: 99%