SoftSec-KAIST / Fuzzing-Survey

The Art, Science, and Engineering of Fuzzing: A Survey
https://fuzzing-survey.org/
GNU General Public License v3.0
194 stars 21 forks source link

List of new target papers #8

Closed bbb1g closed 3 years ago

bbb1g commented 3 years ago

List of target papers:

USENIX 2019

S&P 2019

CCS 2019

ASE 2019

ICSE 2019

FSE 2019

NDSS 2020

USENIX 2020

S&P 2020

ICSE 2020

sangkilc commented 3 years ago

Added FIRM-AFL @ 72d39709e425b96a6202dd1f5c1f08ae5080fee5

sangkilc commented 3 years ago

Added NEUZZ and ILF @ 58c05300920cd09d7a8ad92d5084c40cce3a5cf5

sangkilc commented 3 years ago

Added two more

Jiliac commented 3 years ago

Almost done with 2019! Just ICSE left.

The two firsts and the last paper for ASE 2019 only have 4 pages. Probably they are workshop papers? Maybe we have something similar for USENIX 2020 since it seems a little too much to have 13 fuzzing papers in one conference?

bbb1g commented 3 years ago

Ok I'm gonna checkin

2020년 10월 11일 (일) 오전 3:36, Valentin notifications@github.com님이 작성:

Almost done with 2019! Just ICSE left.

The two firsts and the last paper for ASE 2019 only have 4 pages. Probably they are workshop papers? Maybe we have something similar for USENIX 2020 since it seems a little too much to have 13 fuzzing papers in one conference?

— You are receiving this because you were assigned. Reply to this email directly, view it on GitHub https://github.com/SoftSec-KAIST/Fuzzing-Survey/issues/8#issuecomment-706592876, or unsubscribe https://github.com/notifications/unsubscribe-auth/AHL43FPRSCCTKUFFADMVMULSKCSRLANCNFSM4R7XX5JQ .

bbb1g commented 3 years ago

For ASE, I downloaded all pdfs from this site: https://ieeexplore.ieee.org/xpl/conhome/8949433/proceeding

which included 'ASE 2019 Demonstrations'. We can just delete those 2 papers.

For Usenix Security 2020, I downloaded this file: https://www.usenix.org/sites/default/files/sec20_full_proceedings.pdf

and splited each articles with individual pdf files.

I don't know why there are that much fuzzing-related articles, but I think it is because there exist 'Fuzzing' Category, as follows :

Fuzzing 1 FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning. . . . . . . . . . . 2255 Peiyuan Zong, Tao Lv, Dawei Wang, Zizhuang Deng, Ruigang Liang, and Kai Chen, SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China FuzzGen: Automatic Fuzzer Generation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2271 Kyriakos Ispoglou, Daniel Austin, and Vishwath Mohan, Google Inc.; Mathias Payer, EPFL ParmeSan: Sanitizer-guided Greybox Fuzzing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2289 Sebastian Österlund, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida, Vrije Universiteit Amsterdam EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit. . . . . . . 2307 Tai Yue, Pengfei Wang, Yong Tang, Enze Wang, Bo Yu, Kai Lu, and Xu Zhou, National University of Defense Technology Muzz: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs. . . . . . . . . . . . . . . . 2325 Hongxu Chen, University of Science and Technology of China and Nayang Technological University; Shengjian Guo, Baidu Security; Yinxing Xue, University of Science and Technology of China; Yulei Sui, University of Technology Sydney; Cen Zhang and Yuekang Li, Nanyang Technological University; Haijun Wang, Ant Financial Services Group; Yang Liu, Nanyang Technological University

Fuzzing 2 Analysis of DTLS Implementations Using Protocol State Fuzzing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2523 Paul Fiterau-Brostean and Bengt Jonsson, Uppsala University; Robert Merget, Ruhr-University Bochum; Joeri de Ruiter, SIDN Labs; Konstantinos Sagonas, Uppsala University; Juraj Somorovsky, Paderborn University Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. . . . . . . . . . . . . . . 2541 Dokyung Song, University of California, Irvine; Felicitas Hetzelt, Technische Universität Berlin; Jonghwan Kim and Brent Byunghoon Kang, KAIST; Jean-Pierre Seifert, Technische Universität Berlin; Michael Franz, University of California, Irvine USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2559 Hui Peng, Purdue University; Mathias Payer, EPFL GreyOne: Data Flow Sensitive Fuzzing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2577 Shuitao Gan, State Key Laboratory of Mathematical Engineering and Advanced Computing; Chao Zhang, Institute for Network Sciences and Cyberspace of Tsinghua University; Beijing National Research Center for Information Science and Technology; Peng Chen, ByteDance Inc.; Bodong Zhao, Institute for Network Science and Cyberspace, Tsinghua University; Xiaojun Qin and Dong Wu, State Key Laboratory of Mathematical Engineering and Advanced Computing; Zuoning Chen, National Research Center of Parallel Computer Engineering and Technology Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2595 Zu-Ming Jiang and Jia-Ju Bai, Tsinghua University; Kangjie Lu, University of Minnesota; Shi-Min Hu, Tsinghua University Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer. . . . . . . . . . . . . . . . . . . . . . . . . . . 2613 Suyoung Lee, HyungSeok Han, Sang Kil Cha, and Sooel Son, KAIST

I'm newbie for this area, so I have no idea if this full-proceedings include workshop or something. Can u double-check for this articles?

2020년 10월 11일 (일) 오전 8:20, 이준오 dlwnsdh3@gmail.com님이 작성:

Ok I'm gonna checkin

2020년 10월 11일 (일) 오전 3:36, Valentin notifications@github.com님이 작성:

Almost done with 2019! Just ICSE left.

The two firsts and the last paper for ASE 2019 only have 4 pages. Probably they are workshop papers? Maybe we have something similar for USENIX 2020 since it seems a little too much to have 13 fuzzing papers in one conference?

— You are receiving this because you were assigned. Reply to this email directly, view it on GitHub https://github.com/SoftSec-KAIST/Fuzzing-Survey/issues/8#issuecomment-706592876, or unsubscribe https://github.com/notifications/unsubscribe-auth/AHL43FPRSCCTKUFFADMVMULSKCSRLANCNFSM4R7XX5JQ .

sangkilc commented 3 years ago

Fixed the list and added two more

sangkilc commented 3 years ago

Added two more

sangkilc commented 3 years ago

We need to add SlowFuzz from CCS'17: "https://dl.acm.org/doi/10.1145/3133956.3134073". For some reason, it is missing in our db.

sangkilc commented 3 years ago

Done with NDSS 2020

Jiliac commented 3 years ago

And we are done 🚀