Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution

@inproceedings{Pak2012HybridFT,
  title={Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution},
  author={Brian Pak},
  year={2012}
}
Random mutational fuzz testing (fuzzing) and symbolic executions are program testing techniques that have been gaining popularity in the security research community. Fuzzing finds bugs in a target program by natively executing it with random inputs while monitoring the execution for abnormal behaviors such as crashes. While fuzzing may have a reputation of being able to explore deep into a program’s state space efficiently, naive fuzzers usually have limited code coverage for typical programs… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 24 CITATIONS

1dVul: Discovering 1-Day Vulnerabilities through Binary Patches

  • 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • 2019
VIEW 1 EXCERPT
CITES METHODS

SAVIOR: Towards Bug-Driven Hybrid Testing

Yaohui Chen, Peng Li, +5 authors Long Lu
  • ArXiv
  • 2019
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 45 REFERENCES

Unleashing Mayhem on Binary Code

  • 2012 IEEE Symposium on Security and Privacy
  • 2012
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

EXE: automatically generating inputs of death

  • ACM Conference on Computer and Communications Security
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Antisec hits private intel firm; millions of docs allegedly lifted, 2011. URL http://www.wired.com/threatlevel/2011/12/ antisec-hits-private-intel-firm-million-of-docs-allegedly-lifted

Quinn Norton
  • 2011
VIEW 1 EXCERPT

Sony pictures says lulzsec hacked 37,500 user accounts, not 1 million, 2011. URL http://www.webcitation.org/5zNXkePWU

L. A. Times
  • 2011
VIEW 1 EXCERPT

Advanced format string attacks

P. Hass
  • URL https: //www.defcon.org/images/defcon-18/dc-18-presentations/ Haas/DEFCON-18-Haas-Adv-Format-String-Attacks.pdf
  • 2010
VIEW 1 EXCERPT