2021
DOI: 10.1007/978-3-030-71500-7_19
|View full text |Cite
|
Sign up to set email alerts
|

FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)

Abstract: We describe and evaluate a novel white-box fuzzer for C programs named , which combines fuzzing and symbolic execution, and applies Bounded Model Checking (BMC) to find security vulnerabilities in C programs. explores and analyzes C programs (1) to find execution paths that lead to property violations and (2) to incrementally inject labels to guide the fuzzer and the BMC engine to produce test-cases for code coverage. successfully participates in Test-Comp’21 and achieves first place in the category and sec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2
2
1

Relationship

4
5

Authors

Journals

citations
Cited by 12 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…In earlier work [4], we presented FuSeBMC, an automated test generation tool that exploits the combination of Fuzzing and Bounded Model Checking. FuSeBMC achieved second place in Test-Comp 2021 [5,3] and first place in the Cover-Error category. It ranked fourth in the Cover-Branches category.…”
Section: Overviewmentioning
confidence: 98%
“…In earlier work [4], we presented FuSeBMC, an automated test generation tool that exploits the combination of Fuzzing and Bounded Model Checking. FuSeBMC achieved second place in Test-Comp 2021 [5,3] and first place in the Cover-Error category. It ranked fourth in the Cover-Branches category.…”
Section: Overviewmentioning
confidence: 98%
“…• FuSeBMC [26], [27]: This is a white-box fuzzer that injects labels into C programs and then use a combination of ESBMC and a path-based symbolic execution tool called Map2check [28] to find inputs that reach those labels (while checking for vulnerabilities).…”
Section: B Static Analysismentioning
confidence: 99%
“…• FuSeBMC [27], [28]: This is a white-box fuzzer that injects labels into C programs and then use a combination of ESBMC and a path-based symbolic execution tool called Map2check [29] to find inputs that reach those labels (while checking for vulnerabilities).…”
Section: B Static Analysismentioning
confidence: 99%