Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427266
|View full text |Cite
|
Sign up to set email alerts
|

Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…Future work UltraFuzz is implemented on top of vanilla AFL, and we focus on improving the performance of fuzzing by optimizing the parallel scheme, such as the centralized dynamic scheduling and hierarchical information-sharing. Ul-traFuzz can integrate with works from an orthogonal direction, such as improving execution speed [45][46][47][48], optimizing mutation strategy [16][17][18]28] and power scheduling [20,21], or improving the diversity by taking advantage of different fuzzers [34,49]. We leave these as future work.…”
Section: Discussionmentioning
confidence: 99%
“…Future work UltraFuzz is implemented on top of vanilla AFL, and we focus on improving the performance of fuzzing by optimizing the parallel scheme, such as the centralized dynamic scheduling and hierarchical information-sharing. Ul-traFuzz can integrate with works from an orthogonal direction, such as improving execution speed [45][46][47][48], optimizing mutation strategy [16][17][18]28] and power scheduling [20,21], or improving the diversity by taking advantage of different fuzzers [34,49]. We leave these as future work.…”
Section: Discussionmentioning
confidence: 99%
“…All the fuzzers supported by autofz are AFL [51], AFLFast [6,7], MOpt [31], FairFuzz [28], LearnAFL [49], QSYM [50], Angora [9], Redqueen [3], Radamsa [24], LAF-INTEL [1], and libFuzzer [41]. We utilize the modified version of libFuzzer excerpted from [22] because it does not support seed synchronization. Also, we use the implementation provided by [17] for Radamsa, Redqueen, and LAF-INTEL.…”
Section: Discussionmentioning
confidence: 99%
“…ENFUZZ [10] first demonstrated that deploying various types of fuzzers together allows it to achieve better code coverage. Recently, CUPID [22] showcased that offline analysis with a training set, including empirically collected representative branches, is able to predict target-independent fuzzer combinations. In addition to fuzzer selection, COLLAB-FUZZ [53] illustrates the importance of test case scheduling policies in seed synchronization among the selected fuzzers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Such a trend is common for fuzzer specializations: for example, also Token-level AFL [55] finds diverse and more bugs than prior concepts, missing a few for the same reasons. The ability to find different bugs is a pillar for initiatives like OSS-Fuzz that stack different fuzzers and motivates recent research on ensemble fuzzing [56], [57]. The inclusion relations of Figure 3 are meant to show such differences, which may be overlooked if one looks at bug counts only.…”
Section: A Rq1: Effectiveness In Bug Findingmentioning
confidence: 99%