Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134020
|View full text |Cite
|
Sign up to set email alerts
|

Directed Greybox Fuzzing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
394
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 537 publications
(395 citation statements)
references
References 29 publications
1
394
0
Order By: Relevance
“…Fuzzing has been shown as an effective testing technique to find vulnerabilities. Specifically, greybox fuzzers (e.g., AFL [4] and its variants [13,14]) have gained the popularity and been proven to be practical for finding vulnerabilities in real-world applications.…”
Section: Applications Of Leopardmentioning
confidence: 99%
See 4 more Smart Citations
“…Fuzzing has been shown as an effective testing technique to find vulnerabilities. Specifically, greybox fuzzers (e.g., AFL [4] and its variants [13,14]) have gained the popularity and been proven to be practical for finding vulnerabilities in real-world applications.…”
Section: Applications Of Leopardmentioning
confidence: 99%
“…However, higher coverage does not necessarily imply finding more vulnerabilities because fuzzers are blindly exploring all possible program states without focusing the efforts on the more vulnerable functions. Recently, directed greybox fuzzers (e.g., AFLGo [13] and Hawkeye [20]) are proposed to guide the fuzzing execution towards a predefined vulnerable function (a.k.a. target site) to either reproduce the vulnerability or check whether a patched function is still vulnerable [13].…”
Section: Applications Of Leopardmentioning
confidence: 99%
See 3 more Smart Citations