profile
viewpoint

Ask questionsList of new target papers

List of target papers:

USENIX 2019

  • [x] GRIMOIRE: Synthesizing Structure while Fuzzing
  • [x] EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers
  • [x] RVFUZZER: Finding Input Validation Bugs in Robotic Vehicles Through Control-Guided Testing
  • [x] FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation

S&P 2019

  • [x] Fuzzing File Systems via Two-Dimensional Input Space Exploration
  • [x] NEUZZ: Efficient Fuzzing with Neural Program Smoothing
  • [x] ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery
  • [x] Razzer: Finding Kernel Race Bugs through Fuzzing
  • [x] Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane

CCS 2019

  • [x] Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing
  • [x] Matryoshka: Fuzzing Deeply Nested Branches
  • [x] Learning to Fuzz from Symbolic Execution with Application to Smart Contracts

ASE 2019

  • [ ] Coverage-guided Fuzzing for Feedforward Neural Networks poster
  • [ ] DeepMutation++: a Mutation Testing Framework for Deep Learning Systems poster
  • [x] History-Guided Configuration Diversification for Compiler Test-Program Generation
  • [x] Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
  • [ ] VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization demo track

ICSE 2019

  • [x] Deep Differential Testing of JVM Implementations
  • [x] DIFFUZZ: Differential Fuzzing for Side-Channel Analysis
  • [x] Grey-box Concolic Testing on Binary Code
  • [x] Practical GUI Testing of Android Applications via Model Abstraction and Refinement
  • [x] RESTler: Stateful REST API Fuzzing
  • [x] SLF: Fuzzing without Valid Seed Inputs
  • [x] Superion: Grammar-Aware Greybox Fuzzing

FSE 2019

  • [x] Finding and Understanding Bugs in Software Model Checkers
  • [x] Cerebro: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection

NDSS 2020

  • [x] HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
  • [x] HFL: Hybrid Fuzzing on the Linux Kernel
  • [ ] Data-Driven Debugging for Functional Side Channels not a fuzzer
  • [x] HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
  • [x] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization

USENIX 2020

  • [x] MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs
  • [x] Analysis of DTLS Implementations Using Protocol State Fuzzing
  • [x] GREYONE: Data Flow Sensitive Fuzzing
  • [x] Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection
  • [x] Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
  • [x] FANS: Fuzzing Android Native System Services via Automated Interface Analysis
  • [x] Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
  • [x] SpecFuzz
  • [x] ParmeSan: Sanitizer-guided Greybox Fuzzing
  • [x] USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation
  • [x] Symbolic execution with SYMCC: Don’t interpret, compile!
  • [x] Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
  • [x] EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit

S&P 2020

  • [x] Ex-vivo dynamic analysis framework for Android device drivers
  • [x] Fuzzing JavaScript Engines with Aspect-preserving Mutation
  • [x] KRACE: Data Race Fuzzing for Kernel File Systems
  • [x] Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
  • [x] PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction
  • [x] SAVIOR: Towards Bug-Driven Hybrid Testing
  • [x] TRRespass: Exploiting the Many Sides of Target Row Refresh

ICSE 2020

  • [x] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
  • [x] MemLock: Memory Usage Guided Fuzzing
  • [x] Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
  • [x] JVM Fuzzing for JIT-Induced Side-Channel Detection
  • [x] Targeted Greybox Fuzzing with Static Lookahead Analysis
  • [x] Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks
  • [x] sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts
  • [x] HyDiff: Hybrid Differential Software Analysis
SoftSec-KAIST/Fuzzing-Survey

Answer questions sangkilc

Added two more

useful!

Related questions

No questions were found.
source:https://uonfu.com/
Github User Rank List