2022
DOI: 10.1016/j.cose.2022.102813
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzing vulnerability discovery techniques: Survey, challenges and future directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…Other researchers in the software engineering domain also employed the same data collection process. [54][55][56][57][58][59][60] The following steps were involved in conducting the questionnaire survey.…”
Section: F I G U R E 1 Flowchart Of Research Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Other researchers in the software engineering domain also employed the same data collection process. [54][55][56][57][58][59][60] The following steps were involved in conducting the questionnaire survey.…”
Section: F I G U R E 1 Flowchart Of Research Methodologymentioning
confidence: 99%
“…As a result, we used a non-methodical technique for data collecting, namely an online survey using snow balling technique. Other researchers in the software engineering domain also employed the same date collection process [54][55][56][57][58][59][60]. The following steps were involved in conducting the questionnaire survey:…”
Section: Step-2: Empirical Investigation Figure 1: Flowchart Of Resea...mentioning
confidence: 99%
“…Solutions: This paper suggests utilizing fuzz testing techniques to detect vulnerabilities related to handling mechanism imbalances. Fuzz testing 40 is a technique that involves supplying random, invalid, or abnormal data as input to a program in order to test its behavior. It has already been applied to the detection of vulnerabilities in blockchain smart contracts.…”
Section: Modeling and Solutionsmentioning
confidence: 99%
“…The effectiveness of fuzzing in exploiting program vulnerabilities varies, as different test cases traverse distinct execution paths. Seed scheduling optimization is widely recognized as a highly effective strategy for enhancing the efficiency of fuzzing [2]. In the coverageguided fuzz testing, the fuzzer initially maintains a queue of seeds.…”
Section: Introductionmentioning
confidence: 99%