Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
History-Driven Fuzzing for Deep Learning Libraries
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 34, Issue 1Article No.: 19, Pages 1–29https://doi.org/10.1145/3688838Recently, many Deep Learning (DL) fuzzers have been proposed for API-level testing of DL libraries. However, they either perform unguided input generation (e.g., not considering the relationship between API arguments when generating inputs) or only ...
- articleDecember 2024
DPFuzz: A fuzz testing tool based on the guidance of defect prediction
Science of Computer Programming (SCPR), Volume 238, Issue Chttps://doi.org/10.1016/j.scico.2024.103170AbstractFuzz testing is an automated testing technique that is recognized for its efficiency and scalability. Despite its advantages, the growing complexity and scale of software has made testing software adequately increasingly challenging. If fuzz ...
- research-articleOctober 2024
Validating SMT Solvers for Correctness and Performance via Grammar-Based Enumeration
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA2Article No.: 355, Pages 2378–2401https://doi.org/10.1145/3689795We introduce ET, a grammar-based enumerator for validating SMT solver correctness and performance. By compiling grammars of the SMT theories to algebraic datatypes, ET leverages the functional enumerator FEAT. ET is highly effective at bug finding and ...
- research-articleSeptember 2024
FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 7Article No.: 191, Pages 1–20https://doi.org/10.1145/3674725With the increasing popularity of Decentralized Applications (DApps) in blockchain, securing smart contracts has been a long-term, high-priority subject in the domain. Among the various research directions for vulnerability detection, fuzzing has received ...
- research-articleSeptember 2024
Automated Feature Testing of Verilog Parsers using Fuzzing (Registered Report)
FUZZING 2024: Proceedings of the 3rd ACM International Fuzzing WorkshopPages 70–79https://doi.org/10.1145/3678722.3685536In this article we propose a methodology based on fuzzing to test which features are supported by pasers and register an experiment applying this methodology to SystemVerilog-consuming tools. SystemVerilog is a hardware description, specification and ...
-
- research-articleSeptember 2024
Visualization Task Taxonomy to Understand the Fuzzing Internals (Registered Report)
FUZZING 2024: Proceedings of the 3rd ACM International Fuzzing WorkshopPages 13–22https://doi.org/10.1145/3678722.3685530Greybox fuzzing is used extensively in research and practice. There are umpteen improvements proposed in the literature to improve greybox fuzzing. However, to what extent do these improvements affect the internal components (or internals) of a given ...
- research-articleAugust 2024
Revealing inputs causing web API performance latency using response-time-guided genetic algorithm fuzzing
Artificial Life and Robotics (SPALR), Volume 29, Issue 4Pages 459–472https://doi.org/10.1007/s10015-024-00957-4AbstractWeb APIs are integral to modern web development, enabling service integration and automation. Ensuring their performance and functionality is critical, yet performance testing is less explored due to the difficulty in detecting performance bugs. ...
- research-articleAugust 2024
CriticalFuzz: A critical neuron coverage-guided fuzz testing framework for deep neural networks
Information and Software Technology (INST), Volume 172, Issue Chttps://doi.org/10.1016/j.infsof.2024.107476Abstract Context:Deep neural networks (DNN) have been widely deployed in safety-critical domains, such as autonomous cars and healthcare, where error behaviors can lead to serious accidents, testing DNN is extremely important. Neuron coverage-guided fuzz ...
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Proceedings of the ACM on Software Engineering (PACMSE), Volume 1, Issue FSEArticle No.: 15, Pages 316–337https://doi.org/10.1145/3643741Directed fuzzing recently has gained significant attention due to its ability to reconstruct proof-of-concept (PoC) test cases for target code such as buggy lines or functions. Surprisingly, however, there has been no in-depth study on the way to ...
- research-articleJune 2024
Semantic-guided fuzzing for virtual testing of autonomous driving systems
Journal of Systems and Software (JSSO), Volume 212, Issue Chttps://doi.org/10.1016/j.jss.2024.112017AbstractAutonomous driving systems (ADS) have achieved spectacular development and have been utilized in numerous safety-critical tasks. Nonetheless, in spite of their considerable advancement, ADS perception components with high complexity and low ...
Highlights- We leverage OpenSCENARIO to generate realistic and valid scenarios.
- We propose a novel grammar-aware generation strategy.
- We design a testing guidance criterion that induces failure diversity.
- We test steering controller models ...
- research-articleMay 2024
CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection
Science of Computer Programming (SCPR), Volume 234, Issue Chttps://doi.org/10.1016/j.scico.2023.103076Abstract Context:Smart contracts are computer programs that run on a blockchain. As the functions implemented by smart contracts become increasingly complex, the number of cross-contract interactions within them also rises. Consequently, the ...
Highlights- Addressing the challenge of exploding cross-contract transaction sequences.
- Presenting CrossFuzz, optimizing mutation strategies via inter-contract data flow analysis.
- Experimental results show that CrossFuzz outperforms other fuzz ...
- research-articleApril 2024
Coverage-guided fuzzing for deep reinforcement learning systems
Journal of Systems and Software (JSSO), Volume 210, Issue Chttps://doi.org/10.1016/j.jss.2024.111963AbstractWhile the past decade has witnessed a growing demand for employing deep reinforcement learning (DRL) in various domains to solve real-world problems, the reliability of DRL systems has become more of a concern. In particular, DRL agents are often ...
Highlights- We design a coverage-guided fuzzing framework for testing DRL systems.
- We design a gradient ascent-based seed mutation strategy to generate failed cases.
- We propose to analyze the state coverage by maintaining nearest neighbor ...
- research-articleJuly 2023
Rare Path Guided Fuzzing
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1295–1306https://doi.org/10.1145/3597926.3598136Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, fuzzers often fail to generate inputs for program paths guarded by restrictive branch conditions. In this paper, we show that by first ...
- research-articleDecember 2022
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study
International Journal of Information Security (IJOIS), Volume 22, Issue 2Pages 347–365https://doi.org/10.1007/s10207-022-00630-6AbstractBuilt on top of UDP, the recently standardized QUIC protocol primarily aims to gradually replace the TCP plus TLS plus HTTP/2 model. For instance, HTTP/3 is designed to exploit QUIC’s features, including reduced connection establishment time, ...
- research-articleJanuary 2023Distinguished Paper
Efficient Greybox Fuzzing to Detect Memory Errors
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 37, Pages 1–12https://doi.org/10.1145/3551349.3561161Greybox fuzzing is a proven and effective testing method for the detection of security vulnerabilities and other bugs in modern software systems. Greybox fuzzing can also be used in combination with a sanitizer, such as AddressSanitizer (ASAN), to ...
- surveySeptember 2022
Fuzzing: A Survey for Roadmap
ACM Computing Surveys (CSUR), Volume 54, Issue 11sArticle No.: 230, Pages 1–36https://doi.org/10.1145/3512345Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It generates a large number of test cases and monitors the executions for defects. Fuzzing has detected thousands of bugs and vulnerabilities in various ...
- research-articleJuly 2022
HotFuzz: Discovering Temporal and Spatial Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
- William Blair,
- Andrea Mambretti,
- Sajjad Arshad,
- Michael Weissbacher,
- William Robertson,
- Engin Kirda,
- Manuel Egele
ACM Transactions on Privacy and Security (TOPS), Volume 25, Issue 4Article No.: 33, Pages 1–35https://doi.org/10.1145/3532184Fuzz testing repeatedly assails software with random inputs in order to trigger unexpected program behaviors, such as crashes or timeouts, and has historically revealed serious security vulnerabilities. In this article, we present HotFuzz, a framework for ...
- ArticleMay 2022
Stateful Black-Box Fuzzing of Bluetooth Devices Using Automata Learning
AbstractFuzzing (aka fuzz testing) shows promising results in security testing. The advantage of fuzzing is the relatively simple applicability compared to comprehensive manual security analysis. However, the effectiveness of black-box fuzzing is hard to ...
- research-articleJuly 2022
NNSMT: Deep Neural Networks for SMT Solvers Fuzzing
ICCAI '22: Proceedings of the 8th International Conference on Computing and Artificial IntelligencePages 46–53https://doi.org/10.1145/3532213.3532221SMT solvers are important tools in the field of software engineering, which is often used to determine the satisfiability of formulas in formal methods, such as software verification, program synthesis, program verification, etc. However, due to their ...
- research-articleFebruary 2022
CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation
Future Generation Computer Systems (FGCS), Volume 127, Issue CPages 384–395https://doi.org/10.1016/j.future.2021.09.006AbstractOpenCL programs typically employ complex storage models and diverse data types as well as manifest various memory access patterns, which make it challenging to detect the performance problems effectively. However, few research efforts ...
Highlights- We present a tool that can detect algorithmic complexity vulnerabilities in OpenCL kernels.