Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

List of new target papers #8

Closed
55 tasks done
bbb1g opened this issue Oct 1, 2020 · 11 comments
Closed
55 tasks done

List of new target papers #8

bbb1g opened this issue Oct 1, 2020 · 11 comments
Assignees

Comments

@bbb1g
Copy link

bbb1g commented Oct 1, 2020

List of target papers:

USENIX 2019

  • GRIMOIRE: Synthesizing Structure while Fuzzing
  • EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers
  • RVFUZZER: Finding Input Validation Bugs in Robotic Vehicles Through Control-Guided Testing
  • FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation

S&P 2019

  • Fuzzing File Systems via Two-Dimensional Input Space Exploration
  • NEUZZ: Efficient Fuzzing with Neural Program Smoothing
  • ProFuzzer: On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery
  • Razzer: Finding Kernel Race Bugs through Fuzzing
  • Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane

CCS 2019

  • Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing
  • Matryoshka: Fuzzing Deeply Nested Branches
  • Learning to Fuzz from Symbolic Execution with Application to Smart Contracts

ASE 2019

  • [ ] Coverage-guided Fuzzing for Feedforward Neural Networks poster
  • [ ] DeepMutation++: a Mutation Testing Framework for Deep Learning Systems poster
  • History-Guided Configuration Diversification for Compiler Test-Program Generation
  • Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
  • [ ] VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization demo track

ICSE 2019

  • Deep Differential Testing of JVM Implementations
  • DIFFUZZ: Differential Fuzzing for Side-Channel Analysis
  • Grey-box Concolic Testing on Binary Code
  • Practical GUI Testing of Android Applications via Model Abstraction and Refinement
  • RESTler: Stateful REST API Fuzzing
  • SLF: Fuzzing without Valid Seed Inputs
  • Superion: Grammar-Aware Greybox Fuzzing

FSE 2019

  • Finding and Understanding Bugs in Software Model Checkers
  • Cerebro: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection

NDSS 2020

  • HYPER-CUBE: High-Dimensional Hypervisor Fuzzing
  • HFL: Hybrid Fuzzing on the Linux Kernel
  • [ ] Data-Driven Debugging for Functional Side Channels not a fuzzer
  • HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing
  • Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization

USENIX 2020

  • MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs
  • Analysis of DTLS Implementations Using Protocol State Fuzzing
  • GREYONE: Data Flow Sensitive Fuzzing
  • Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection
  • Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer
  • FANS: Fuzzing Android Native System Services via Automated Interface Analysis
  • Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
  • SpecFuzz
  • ParmeSan: Sanitizer-guided Greybox Fuzzing
  • USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation
  • Symbolic execution with SYMCC: Don’t interpret, compile!
  • Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets
  • EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit

S&P 2020

  • Ex-vivo dynamic analysis framework for Android device drivers
  • Fuzzing JavaScript Engines with Aspect-preserving Mutation
  • KRACE: Data Race Fuzzing for Kernel File Systems
  • Neutaint: Efficient Dynamic Taint Analysis with Neural Networks
  • PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction
  • SAVIOR: Towards Bug-Driven Hybrid Testing
  • TRRespass: Exploiting the Many Sides of Target Row Refresh

ICSE 2020

  • Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
  • MemLock: Memory Usage Guided Fuzzing
  • Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference
  • JVM Fuzzing for JIT-Induced Side-Channel Detection
  • Targeted Greybox Fuzzing with Static Lookahead Analysis
  • Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural Networks
  • sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts
  • HyDiff: Hybrid Differential Software Analysis
@sangkilc
Copy link
Member

sangkilc commented Oct 3, 2020

Added FIRM-AFL @ 72d3970

@sangkilc
Copy link
Member

sangkilc commented Oct 3, 2020

Added NEUZZ and ILF @ 58c0530

@sangkilc
Copy link
Member

sangkilc commented Oct 7, 2020

Added two more

@Jiliac
Copy link
Collaborator

Jiliac commented Oct 10, 2020

Almost done with 2019! Just ICSE left.

The two firsts and the last paper for ASE 2019 only have 4 pages. Probably they are workshop papers? Maybe we have something similar for USENIX 2020 since it seems a little too much to have 13 fuzzing papers in one conference?

@bbb1g
Copy link
Author

bbb1g commented Oct 10, 2020 via email

@bbb1g
Copy link
Author

bbb1g commented Oct 11, 2020 via email

@sangkilc
Copy link
Member

Fixed the list and added two more

@sangkilc
Copy link
Member

Added two more

@sangkilc
Copy link
Member

We need to add SlowFuzz from CCS'17: "https://dl.acm.org/doi/10.1145/3133956.3134073". For some reason, it is missing in our db.

@sangkilc
Copy link
Member

Done with NDSS 2020

@Jiliac
Copy link
Collaborator

Jiliac commented Oct 18, 2020

And we are done 🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants