Coverage-guided fuzz testing (“fuzzing”) has become main- stream and we have observed lots of progress in this research area recently. However, it is still challenging to efficiently test network services with existing coverage-guided fuzzing methods. In this paper, we introduce the design and implementation of Nyx-Net, a novel snapshot-based fuzzing approach that can successfully fuzz a wide range of targets spanning servers, clients, games, and even Firefox’s Inter- Process Communication (IPC) interface. Compared to state- of-the-art methods, Nyx-Net improves test throughput by up to 300x and coverage found by up to 70%. Additionally, Nyx-Net is able to find crashes in two of ProFuzzBench’s targets that no other fuzzer found previously. W...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Coverage-guided greybox fuzzing aims at generating random test inputs to trigger vulnerabilities in ...
Abstract Security vulnerability is one of the root causes of cyber-security threats. To discover vul...
Coverage-guided fuzz testing ("fuzzing") has become mainstream and we have observed lots of progress...
In recent years, fuzz testing has benefited from increased com- putational power and important algor...
Fuzz testing (“fuzzing”) is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing (“fuzzing”) is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Real-world infrastructure offers many scenarios where protocols (and other details) are not released...
This artifact accompanies the paper "FuzzFactory: Domain-Specific Fuzzing with Waypoints", submitted...
International audienceWe propose a game theoretical model for fuzz testing, consisting in generating...
In recent years, fuzz testing has benefited from increased computational power and important algorit...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Generation-based fuzzing is a software testing approach which is able to discover different types of...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Coverage-guided greybox fuzzing aims at generating random test inputs to trigger vulnerabilities in ...
Abstract Security vulnerability is one of the root causes of cyber-security threats. To discover vul...
Coverage-guided fuzz testing ("fuzzing") has become mainstream and we have observed lots of progress...
In recent years, fuzz testing has benefited from increased com- putational power and important algor...
Fuzz testing (“fuzzing”) is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing (“fuzzing”) is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Fuzz testing ("fuzzing") is a widely-used and effective dynamic technique to discover crashes and se...
Real-world infrastructure offers many scenarios where protocols (and other details) are not released...
This artifact accompanies the paper "FuzzFactory: Domain-Specific Fuzzing with Waypoints", submitted...
International audienceWe propose a game theoretical model for fuzz testing, consisting in generating...
In recent years, fuzz testing has benefited from increased computational power and important algorit...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Generation-based fuzzing is a software testing approach which is able to discover different types of...
Fuzzing is a simple yet effect approach to discover bugs by repeatedly testing the target system usi...
Coverage-guided greybox fuzzing aims at generating random test inputs to trigger vulnerabilities in ...
Abstract Security vulnerability is one of the root causes of cyber-security threats. To discover vul...