The cite ratio column below gives the percentage of incoming citations of a given paper of the total citations of a paper (incoming and outgoing). If the paper has no outgoing citations then it will be 1.0 + (0.01 * number of incoming citations).
Title | Incoming Citations | Outgoing Citations | # Of Incoming | # Of Outgoing | Cite ratio |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production |
Scheduling Black-box Mutational Fuzzing Enhancing Symbolic Execution with Veritesting | DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems EXE: Automatically Generating Inputs of Death | 2 | 5 | 0.2857142857142857 |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | IMF: Inferred Model-based Fuzzer Coverage-Directed Differential Testing of JVM Implementations SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities Fuzzing with Code Fragments IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming | 1 | 5 | 0.16666666666666666 |
Dowsing for Overows: A Guided Fuzzer to Find Buffer Boundary Violations |
0 | 0 | 0.0 | ||
JQF: Coverage-Guided Property-Based Testing in Java |
Semantic Fuzzing with Zest | Semantic Fuzzing with Zest | 1 | 1 | 0.5 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Semantic Fuzzing with Zest Evaluating Fuzz Testing | DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing Program-Adaptive Mutational Fuzzing QuickFuzz: An Automatic Random Fuzzer for Common File Formats Grammar-based Whitebox Fuzzing Fuzzing with Code Fragments KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection EXE: Automatically Generating Inputs of Death | 3 | 12 | 0.2 |
CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems |
0 | 0 | 0.0 | ||
IT: Lightweight Instrumentation for Coverage-guided Fuzzing |
0 | 0 | 0.0 | ||
Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing |
Evaluating Fuzz Testing | 1 | 0 | 1.01 | |
IMF: Inferred Model-based Fuzzer |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Evaluating Fuzz Testing | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Program-Adaptive Mutational Fuzzing Fuzzing with Code Fragments | 3 | 3 | 0.5 |
CollAFL: Path Sensitive Fuzzing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | 1 | 0 | 1.01 | |
I: Exploring Deep State Spaces via Fuzzing |
0 | 0 | 0.0 | ||
Zest: Validity Fuzzing and Parametric Generators for Effective Random Testing |
0 | 0 | 0.0 | ||
Testing Closed-Source Binary Device Drivers with DDT |
S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g EXE: Automatically Generating Inputs of Death | 1 | 3 | 0.25 |
DART: Directed Automated Random Testing |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production DIFUZE: Interface Aware Fuzzing for Kernel Drivers Coverage-Directed Differential Testing of JVM Implementations Taint-based Directed Whitebox Fuzzing FUDGE: Fuzz Driver Generation at Scale Synthesizing Racy Tests FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest CUTE: A Concolic Unit Testing Engine for C FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage A X Shadow of a Doubt: Testing for Divergences Between Software Versions Grammar-based Whitebox Fuzzing Random Testing for Security: Blackbox vs. Whitebox Fuzzing Chopped Symbolic Execution GRT: Program-Analysis-Guided Random Testing PerfFuzz: Automatically Generating Pathological Inputs kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Enhancing Symbolic Execution with Veritesting EXE: Automatically Generating Inputs of Death Efcient State Merging in Symbolic Execution Accelerating Array Constraints in Symbolic Execution | S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g | 22 | 1 | 0.9565217391304348 |
K: Data Race Fuzzing for Kernel File Systems |
0 | 0 | 0.0 | ||
Coverage-Directed Differential Testing of JVM Implementations |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation | DART: Directed Automated Random Testing Taming Compiler Fuzzers Differential Testing for Software | 1 | 3 | 0.25 |
Multi-solver Support in Symbolic Execution |
Chopped Symbolic Execution Accelerating Array Constraints in Symbolic Execution | 2 | 0 | 1.02 | |
Scheduling Black-box Mutational Fuzzing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing P: Stateful Black-Box Fuzzing of Proprietary Network Protocols Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing Evaluating Fuzz Testing kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | Billions and Billions of Constraints: Whitebox Fuzz Testing in Production | 5 | 1 | 0.8333333333333334 |
Automated Whitebox Fuzz Testing |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing FUDGE: Fuzz Driver Generation at Scale Learning to Fuzz from Symbolic Execution with Application to Smart Contracts S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems ... Running Symbolic Execution Forever Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing Grammar-based Whitebox Fuzzing Random Testing for Security: Blackbox vs. Whitebox Fuzzing Chopped Symbolic Execution Directed Greybox Fuzzing Enhancing Symbolic Execution with Veritesting Efcient State Merging in Symbolic Execution | S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g Autodafe: an Act of Software Torture EXE: Automatically Generating Inputs of Death | 14 | 3 | 0.8235294117647058 |
Detecting Atomic-Set Serializability Violations in Multi- threaded Programs through Active Randomized Testing |
0 | 0 | 0.0 | ||
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production DIFUZE: Interface Aware Fuzzing for Kernel Drivers IMF: Inferred Model-based Fuzzer Testing Closed-Source Binary Device Drivers with DDT Synthesizing Racy Tests Learning to Fuzz from Symbolic Execution with Application to Smart Contracts S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Analysing the Program Analyser Semantic Fuzzing with Zest ... Running Symbolic Execution Forever FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage A X Shadow of a Doubt: Testing for Divergences Between Software Versions Targeted Program Transformations for Symbolic Execution Directed Greybox Fuzzing PerfFuzz: Automatically Generating Pathological Inputs jFuzz: A Concolic Whitebox Fuzzer for Java kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Enhancing Symbolic Execution with Veritesting Efcient State Merging in Symbolic Execution Accelerating Array Constraints in Symbolic Execution | 23 | 0 | 1.23 | |
Taint-based Directed Whitebox Fuzzing |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage ... FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage Directed Greybox Fuzzing PerfFuzz: Automatically Generating Pathological Inputs | DART: Directed Automated Random Testing CUTE: A Concolic Unit Testing Engine for C Grammar-based Whitebox Fuzzing EXE: Automatically Generating Inputs of Death | 7 | 4 | 0.6363636363636364 |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation DIFUZE: Interface Aware Fuzzing for Kernel Drivers IMF: Inferred Model-based Fuzzer CollAFL: Path Sensitive Fuzzing Scheduling Black-box Mutational Fuzzing Automated Whitebox Fuzz Testing Taint-based Directed Whitebox Fuzzing Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems Skyre: Data-Driven Seed Generation for Fuzzing Program-Adaptive Mutational Fuzzing SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities Angora: Efcient Fuzzing by Principled Search T-Fuzz: fuzzing by program transformation Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits Evaluating Fuzz Testing Directed Greybox Fuzzing kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | 0 | 21 | 0.0 | |
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | 1 | 0 | 1.01 | |
S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production Testing Closed-Source Binary Device Drivers with DDT DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest Shadow Symbolic Execution for Better Testing of Evolving Software Grammar-based Whitebox Fuzzing Enhancing Symbolic Execution with Veritesting | 10 | 0 | 1.1 | |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Learning to Fuzz from Symbolic Execution with Application to Smart Contracts FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest ... S: Interleaving Symbolic with Concrete Execution SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits Evaluating Fuzz Testing Directed Greybox Fuzzing kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | Taming Compiler Fuzzers Enhancing Symbolic Execution with Veritesting EXE: Automatically Generating Inputs of Death | 11 | 3 | 0.7857142857142857 |
FUDGE: Fuzz Driver Generation at Scale |
DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing | 0 | 2 | 0.0 | |
Well Theres Your Problem: Isolating the Crash-Inducing Bits in a Fuzzed File |
0 | 0 | 0.0 | ||
VUzzer: Application-aware Evolutionary Fuzzing |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits Evaluating Fuzz Testing Directed Greybox Fuzzing PerfFuzz: Automatically Generating Pathological Inputs kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | 9 | 0 | 1.09 | |
Autodafe: an Act of Software Torture |
Automated Whitebox Fuzz Testing | 1 | 0 | 1.01 | |
Synthesizing Racy Tests |
DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | 0 | 2 | 0.0 | |
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts |
Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Driller: Augmenting Fuzzing Through Selective Symbolic Execution T-Fuzz: fuzzing by program transformation Grammar-based Whitebox Fuzzing Synthesizing Program Input Grammars Fuzzing with Code Fragments EXE: Automatically Generating Inputs of Death | 0 | 8 | 0.0 | |
T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols |
0 | 0 | 0.0 | ||
... |
Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems Grammar-based Whitebox Fuzzing | 0 | 6 | 0.0 | |
Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications |
0 | 0 | 0.0 | ||
Systematic Fuzzing and Testing of TLS Libraries |
0 | 0 | 0.0 | ||
S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing ... A X Directed Greybox Fuzzing Enhancing Symbolic Execution with Veritesting | Testing Closed-Source Binary Device Drivers with DDT Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g CUTE: A Concolic Unit Testing Engine for C EXE: Automatically Generating Inputs of Death | 6 | 6 | 0.5 |
FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage |
Semantic Fuzzing with Zest | DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing Program-Adaptive Mutational Fuzzing Grammar-based Whitebox Fuzzing Synthesizing Program Input Grammars Fuzzing with Code Fragments Directed Greybox Fuzzing Enhancing Symbolic Execution with Veritesting | 1 | 12 | 0.07692307692307693 |
Skyre: Data-Driven Seed Generation for Fuzzing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | 1 | 0 | 1.01 | |
PexWhite Box Test Generation for .NET |
0 | 0 | 0.0 | ||
Program-Adaptive Mutational Fuzzing |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers IMF: Inferred Model-based Fuzzer Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage Evaluating Fuzz Testing PerfFuzz: Automatically Generating Pathological Inputs kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | 8 | 0 | 1.08 | |
QuickFuzz: An Automatic Random Fuzzer for Common File Formats |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Evaluating Fuzz Testing | Grammar-based Whitebox Fuzzing | 2 | 1 | 0.6666666666666666 |
Optimizing Seed Selection for Fuzzing |
Semantic Fuzzing with Zest Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing Evaluating Fuzz Testing kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | 4 | 0 | 1.04 | |
Exploring Abstraction Functions in Fuzzing |
0 | 0 | 0.0 | ||
R: Fuzzing with Input-to-State Correspondence |
0 | 0 | 0.0 | ||
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices |
0 | 0 | 0.0 | ||
Analysing the Program Analyser |
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Many-Core Compiler Fuzzing Targeted Program Transformations for Symbolic Execution | 0 | 3 | 0.0 | |
Semantic Fuzzing with Zest |
JQF: Coverage-Guided Property-Based Testing in Java | JQF: Coverage-Guided Property-Based Testing in Java DIFUZE: Interface Aware Fuzzing for Kernel Drivers DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Optimizing Seed Selection for Fuzzing Grammar-based Whitebox Fuzzing Synthesizing Program Input Grammars Fuzzing with Code Fragments Evaluating Fuzz Testing Directed Greybox Fuzzing Enhancing Symbolic Execution with Veritesting | 1 | 15 | 0.0625 |
CUTE: A Concolic Unit Testing Engine for C |
Taint-based Directed Whitebox Fuzzing S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems Shadow of a Doubt: Testing for Divergences Between Software Versions Grammar-based Whitebox Fuzzing Chopped Symbolic Execution GRT: Program-Analysis-Guided Random Testing Enhancing Symbolic Execution with Veritesting EXE: Automatically Generating Inputs of Death Accelerating Array Constraints in Symbolic Execution | DART: Directed Automated Random Testing | 9 | 1 | 0.9 |
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Singularity: Pattern Fuzzing for Worst Case Complexity Evaluating Fuzz Testing PerfFuzz: Automatically Generating Pathological Inputs | 5 | 0 | 1.05 | |
A DSL Approach to Reconcile Equivalent Divergent Program Executions |
0 | 0 | 0.0 | ||
Shadow Symbolic Execution for Better Testing of Evolving Software |
Shadow of a Doubt: Testing for Divergences Between Software Versions | S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g | 1 | 1 | 0.5 |
Vthe Unbelievable |
0 | 0 | 0.0 | ||
Floating-Point Symbolic Execution: A Case Study in N-Version Programming |
0 | 0 | 0.0 | ||
Angora: Efcient Fuzzing by Principled Search |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | 1 | 0 | 1.01 | |
T-Fuzz: fuzzing by program transformation |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Learning to Fuzz from Symbolic Execution with Application to Smart Contracts Evaluating Fuzz Testing | 3 | 0 | 1.03 | |
Symbooglix: A Symbolic Execution Engine for Boogie Programs |
0 | 0 | 0.0 | ||
Checksum-Aware Fuzzing Combined with Dynamic Taint Analysis and Symbolic Execution 15 |
0 | 0 | 0.0 | ||
PARTI: A Multi-interval Theory Solver for Symbolic Execution |
0 | 0 | 0.0 | ||
Running Symbolic Execution Forever |
Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | 0 | 2 | 0.0 | |
H-C: High-Dimensional Hypervisor Fuzzing |
0 | 0 | 0.0 | ||
FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage |
Hawkeye: Towards a Desired Directed Grey-box Fuzzer | DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing Program-Adaptive Mutational Fuzzing Grammar-based Whitebox Fuzzing Synthesizing Program Input Grammars Fuzzing with Code Fragments Directed Greybox Fuzzing | 1 | 8 | 0.1111111111111111 |
P: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction |
0 | 0 | 0.0 | ||
A X |
DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems Grammar-based Whitebox Fuzzing Directed Greybox Fuzzing | 0 | 5 | 0.0 | |
Shadow of a Doubt: Testing for Divergences Between Software Versions |
DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs CUTE: A Concolic Unit Testing Engine for C Shadow Symbolic Execution for Better Testing of Evolving Software | 0 | 4 | 0.0 | |
USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation |
0 | 0 | 0.0 | ||
P: Stateful Black-Box Fuzzing of Proprietary Network Protocols |
Scheduling Black-box Mutational Fuzzing | 0 | 1 | 0.0 | |
Taming Compiler Fuzzers |
Coverage-Directed Differential Testing of JVM Implementations Driller: Augmenting Fuzzing Through Selective Symbolic Execution Evaluating Fuzz Testing | Differential Testing for Software | 3 | 1 | 0.75 |
Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Evaluating Fuzz Testing | Scheduling Black-box Mutational Fuzzing Automated Whitebox Fuzz Testing Optimizing Seed Selection for Fuzzing Fuzzing with Code Fragments | 2 | 4 | 0.3333333333333333 |
C:AFrameworkfortheAnalysisofCode,Test,andCoverageEvolutioninRealSoftware |
0 | 0 | 0.0 | ||
Grammar-based Whitebox Fuzzing |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers Taint-based Directed Whitebox Fuzzing Learning to Fuzz from Symbolic Execution with Application to Smart Contracts FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage QuickFuzz: An Automatic Random Fuzzer for Common File Formats Semantic Fuzzing with Zest ... FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage A X Synthesizing Program Input Grammars PerfFuzz: Automatically Generating Pathological Inputs | DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g CUTE: A Concolic Unit Testing Engine for C EXE: Automatically Generating Inputs of Death | 11 | 5 | 0.6875 |
Synthesizing Program Input Grammars |
Learning to Fuzz from Symbolic Execution with Application to Smart Contracts FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage | Grammar-based Whitebox Fuzzing Fuzzing with Code Fragments EXE: Automatically Generating Inputs of Death | 4 | 3 | 0.5714285714285714 |
S: Interleaving Symbolic with Concrete Execution |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution | 0 | 1 | 0.0 | |
Fuzzing with Code Fragments |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation DIFUZE: Interface Aware Fuzzing for Kernel Drivers IMF: Inferred Model-based Fuzzer Learning to Fuzz from Symbolic Execution with Application to Smart Contracts FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing Synthesizing Program Input Grammars PerfFuzz: Automatically Generating Pathological Inputs KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Automated Testing for SQL Injection Vulnerabilities: An Input Mutation Approach | 13 | 0 | 1.13 | |
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing | Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing | 1 | 2 | 0.3333333333333333 |
Automated Test Input Generation for Android: Are We There Yet? |
0 | 0 | 0.0 | ||
Singularity: Pattern Fuzzing for Worst Case Complexity |
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities | 0 | 1 | 0.0 | |
Evaluating Fuzz Testing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Semantic Fuzzing with Zest | DIFUZE: Interface Aware Fuzzing for Kernel Drivers Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing IMF: Inferred Model-based Fuzzer Scheduling Black-box Mutational Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing Program-Adaptive Mutational Fuzzing QuickFuzz: An Automatic Random Fuzzer for Common File Formats Optimizing Seed Selection for Fuzzing SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities T-Fuzz: fuzzing by program transformation Taming Compiler Fuzzers Turning Programs against Each Other: High Coverage Fuzz-Testing using Binary-Code Mutation and Dynamic Slicing Directed Greybox Fuzzing kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels | 2 | 15 | 0.11764705882352941 |
Random Testing for Security: Blackbox vs. Whitebox Fuzzing |
DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing | 0 | 2 | 0.0 | |
Chopped Symbolic Execution |
DART: Directed Automated Random Testing Multi-solver Support in Symbolic Execution Automated Whitebox Fuzz Testing CUTE: A Concolic Unit Testing Engine for C EXE: Automatically Generating Inputs of Death Accelerating Array Constraints in Symbolic Execution | 0 | 6 | 0.0 | |
Protocol State Fuzzing of TLS Implementations |
0 | 0 | 0.0 | ||
1 AutoPandas: Neural-Backed Generators for Program Synthesis |
0 | 0 | 0.0 | ||
Many-Core Compiler Fuzzing |
Analysing the Program Analyser | 1 | 0 | 1.01 | |
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary |
0 | 0 | 0.0 | ||
Targeted Program Transformations for Symbolic Execution |
Analysing the Program Analyser Accelerating Array Constraints in Symbolic Execution | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | 2 | 1 | 0.6666666666666666 |
Directed Greybox Fuzzing |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage A X Evaluating Fuzz Testing | Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems | 6 | 6 | 0.5 |
Matryoshka: Fuzzing Deeply Nested Branches |
0 | 0 | 0.0 | ||
GRT: Program-Analysis-Guided Random Testing |
DART: Directed Automated Random Testing CUTE: A Concolic Unit Testing Engine for C | 0 | 2 | 0.0 | |
PerfFuzz: Automatically Generating Pathological Inputs |
DART: Directed Automated Random Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Taint-based Directed Whitebox Fuzzing VUzzer: Application-aware Evolutionary Fuzzing Program-Adaptive Mutational Fuzzing SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities Grammar-based Whitebox Fuzzing Fuzzing with Code Fragments Enhancing Symbolic Execution with Veritesting | 0 | 9 | 0.0 | |
2 The S2E Platform: Design, Implementation, and Applications |
0 | 0 | 0.0 | ||
KameleonFuzz: Evolutionary Fuzzing for Black-Box XSS Detection |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers | Fuzzing with Code Fragments | 1 | 1 | 0.5 |
jFuzz: A Concolic Whitebox Fuzzer for Java |
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | 0 | 1 | 0.0 | |
Fuzzing: The State of the Art Executive Summary |
0 | 0 | 0.0 | ||
Q : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing |
0 | 0 | 0.0 | ||
kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels |
Be Sensitive and Collaborative: Analyzing Impact of Coverage Metrics in Greybox Fuzzing Evaluating Fuzz Testing | DART: Directed Automated Random Testing Scheduling Black-box Mutational Fuzzing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs Driller: Augmenting Fuzzing Through Selective Symbolic Execution VUzzer: Application-aware Evolutionary Fuzzing Program-Adaptive Mutational Fuzzing Optimizing Seed Selection for Fuzzing Fuzzing with Code Fragments | 2 | 8 | 0.2 |
IFuzzer: An Evolutionary Interpreter Fuzzer using Genetic Programming |
MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation | 1 | 0 | 1.01 | |
Enhancing Symbolic Execution with Veritesting |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage Semantic Fuzzing with Zest PerfFuzz: Automatically Generating Pathological Inputs | Billions and Billions of Constraints: Whitebox Fuzz Testing in Production DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs S y m b o l i c E x e c u t i o n a n d P r o g r a m T e s t i n g S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems CUTE: A Concolic Unit Testing Engine for C EXE: Automatically Generating Inputs of Death | 4 | 8 | 0.3333333333333333 |
EXE: Automatically Generating Inputs of Death |
Billions and Billions of Constraints: Whitebox Fuzz Testing in Production DIFUZE: Interface Aware Fuzzing for Kernel Drivers Testing Closed-Source Binary Device Drivers with DDT Automated Whitebox Fuzz Testing Taint-based Directed Whitebox Fuzzing Driller: Augmenting Fuzzing Through Selective Symbolic Execution Learning to Fuzz from Symbolic Execution with Application to Smart Contracts S2E: A Platform for In-Vivo Multi-Path Analysis of Software Systems Grammar-based Whitebox Fuzzing Synthesizing Program Input Grammars Chopped Symbolic Execution Enhancing Symbolic Execution with Veritesting Efcient State Merging in Symbolic Execution Accelerating Array Constraints in Symbolic Execution | DART: Directed Automated Random Testing CUTE: A Concolic Unit Testing Engine for C | 14 | 2 | 0.875 |
F-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation |
0 | 0 | 0.0 | ||
Automatic Testing of Symbolic Execution Engines via Program Generation and Differential Testing |
0 | 0 | 0.0 | ||
Hawkeye: Towards a Desired Directed Grey-box Fuzzer |
FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage | 0 | 1 | 0.0 | |
FirmFuzz: Automated IoT Firmware Introspection and Analysis |
0 | 0 | 0.0 | ||
Automated Testing for SQL Injection Vulnerabilities: An Input Mutation Approach |
Fuzzing with Code Fragments | 0 | 1 | 0.0 | |
Differential Testing for Software |
Coverage-Directed Differential Testing of JVM Implementations Taming Compiler Fuzzers | 2 | 0 | 1.02 | |
Efcient State Merging in Symbolic Execution |
DART: Directed Automated Random Testing Automated Whitebox Fuzz Testing KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs EXE: Automatically Generating Inputs of Death | 0 | 4 | 0.0 | |
Accelerating Array Constraints in Symbolic Execution |
Chopped Symbolic Execution | DART: Directed Automated Random Testing Multi-solver Support in Symbolic Execution KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs CUTE: A Concolic Unit Testing Engine for C Targeted Program Transformations for Symbolic Execution EXE: Automatically Generating Inputs of Death | 1 | 6 | 0.14285714285714285 |