Recently read academic papers, articles on Web Security/Fuzzing, etc., and some reading notes written by myself or excerpted from other sources.
- Recommend Conferences
- ACM
- ACSAC
- ASE
- Arxiv
- AsiaCCS
- Black Hat
- Black Hat EU
- Black Hat USA
- Black Hat WorkShop
- Blog
- CCS
- DSN
- Defcon
- ESEC/FSE
- FSE
- H2HC
- HITB
- ICSE
- ICST
- IEEE
- IEEE S&P
- IEEE-ACM
- IJCAI
- ISSTA
- MS
- Misc
- NDSS
- OOPSLA
- Offensive
- PLDI
- PPT
- QPSS
- RAID
- SIGMOD
- SIGPLAN
- Secwest
- TSE
- USENIX ATC
- Usenix
- WOOT
- Whitepaper
Conference | Full Name | dblp Link |
---|---|---|
CCS | ACM Conference on Computer and Communications Security | https://dblp.uni-trier.de/db/conf/uss/ |
Usenix | USENIX Security Symposium | https://dblp.uni-trier.de/db/conf/ccs/ |
S&P | IEEE Symposium on Security and Privacy | https://dblp.uni-trier.de/db/conf/sp/ |
NDSS | ISOC Network and Distributed System Security Symposium | https://dblp.uni-trier.de/db/conf/ndss/ |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables | Schwartz | 2018 | Decompile | |
Automatic exploit generation | Fuzz | |||
Predicting vulnerable software components | Fuzz | |||
Scheduling Black-box Mutational Fuzzing | Fuzz | |||
Symbolic execution for software testing three decades later | Fuzz | |||
evaluating fuzz testing | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Opening Pandora's Box through ATFuzzer: Dynamic Analysis of AT Interface for Android Smartphones | Imtiaz Karim | Purdue University | 2019 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
BigFuzz: Efficient Fuzz Testing for Data Analytics using Framework Abstraction | Qian Zhang | University of California, Los Angeles | 2020 | Fuzz |
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences | Yuqi Chen | Singapore University of Technology and Design, Singapore | 2019 | Fuzz |
FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage | Caroline Lemieux | University of California, Berkeley, USA | 2018 | Fuzz;AFL |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Building Fast Fuzzers | Rahul Gopinath and Andreas Zeller | CISPA | 2019 | Fuzz |
Improving Grey-Box Fuzzing by Modeling Program Behavior | 2019 | Fuzz | ||
Adaptive Grey-Box Fuzz-Testing with Thompson Sampling | Fuzz | |||
Attention Is All You Need | Fuzz | |||
Deep Reinforcement Fuzzing | Fuzz | |||
FuzzerGym A Competitive Framework for Fuzzing | Fuzz | |||
Fuzzing Art, Science and Engineering | Fuzz | |||
Leveraging Textual Specifications for Grammar-based Fuzzing of Network Protocols | Fuzz | |||
NEUZZ Efficient Fuzzing with Neural Program Learning | Fuzz | |||
NEUZZ Efficient Fuzzing with Neural Program Smoothing | Fuzz | |||
Not all bytes are equal Neural byte sieve for fuzzing | Fuzz | |||
TensorFuzz Debugging Neural Networks with Coverage-GUided Fuzzing | Fuzz | |||
neural machine translation inspired binary code similarity comparison beyond function pairs | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing | Xiaogang Zhu | Swinburne University of Technology | 2019 | Fuzzing |
PTrix Efficient Hardware-Assisted Fuzzing for COTS Binary | Yaohui Chen | Northeastern University | 2019 | Fuzz |
Practical Side-Channel Attacks against WPA-TKIP | Domien Schepers | 2019 | Wi;Fi | |
ScriptProtect: Mitigating UnsafeThird-Party JavaScript Practices | Marius Musch | TU Braunschweig | 2019 | XSS |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
A New Class of DNS Vulnerabilities Affecting Many DNS-as-Service Platforms | Shir Tamari | Wiz.io | 2021 | DNS;Cloud |
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication | Marcus Brinkmann | Ruhr University Bochum | 2021 | TLS |
Another Road Leads to the Host: From a Message to VM Escape on Nvidia vGPU | Wenxiang Qian | Tencent Blade Team | 2021 | VM Escape |
Breaking the Isolation: Cross-Account AWS Vulnerabilities | Shir Tamari | Wiz.io | 2021 | AWS;Cloud |
Bypassing Windows Hello for Business and Pleasure | Omer Tsarfati | CyberArk | 2021 | Windows;Auth |
Do You Speak My Language? Make Static Analysis Engines Understand Each Other | Ibrahim Elsayed | 2021 | Static Analysis | |
Let's Attack Let's Encrypt | Haya Shulman | 2021 | Crypto;CA | |
Mobius Band: Explore Hyper-V Attack Interface through Vulnerabilities Internals | Zhenhao Hong | Ant Group Light-Year Security Lab | 2021 | Hyper-V;Exploit |
hAFL1: Our Journey of Fuzzing Hyper-V and Discovering a 0-Day | Peleg Hadar | SafeBreach Labs | 2021 | Fuzz;Virtual |
0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars | Zhiqiang Cai | KeenLab | 2019 | Car |
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web | Joshua Maddux | PKC Security | 2019 | Web;SSRF;API |
All the 4G Modules Could be Hacked | Shupeng Gao | Baidu Security Lab | 2019 | 4G;IoT |
Attack Surface as a Service | Anna Westelius | Arkose Labs | 2019 | PPT |
Attacking And Defending The Microsoft Cloud | Sean Metcalf | 2019 | Web | |
Battle Of Windows Service A Silver Bullet To Discover File Privilege Escalation Bugs Automatically | Wenxu Wu (@Ma7h1as) | Xuanwu Lab of Tencent | 2019 | Windows;Fuzz;Logic |
DevSecOps : What, Why and How | Anant Shrivastava | NotSoSecure | 2019 | DevSecOps |
Dragonblood: Attacking the Dragonfly Handshake of WPA3 | Mathy Vanhoef | New York University Abu Dhabi | 2019 | Wifi |
Exploiting Qualcomm WLAN and Modem Over The Air | Xiling Gong | Tencent Blade Team | 2019 | WLAN |
HTTP Desync Attacks: Smashing into the Cell Next Door | James Kettle | PortSwigger Web Security | 2019 | Web |
HostSplit: Exploitable Antipatterns in Unicode Normalization | Jonathan Birch | Microsoft | 2019 | IDN |
I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy | Matt Wixey | PwC | 2019 | Social Engineering |
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs | Orange Tsai | DEVCORE | 2019 | Web |
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception | Luke Valenta | Cloudflare | 2019 | Web |
Munoz SSO Wars The Token Menace | Alvaro Munoz | 2019 | Web;Auth;SAML | |
Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities at Scale | Aladdin Almubayed | Netflix | 2019 | Supply Chain |
The Enemy Within: Modern Supply Chain Attacks | Eric Doerr | MSRC | 2019 | Supply Chain |
WebAssembly A New World of Native Exploits On The Web | 2018 | WebAssembly | ||
HEIST HTTP Encrypted Information Can Be Stolen Through TCP Windows | 2016 | HTTPS Side-Channel | ||
Molinyawe Shell On Earth From Browser To System Compromise | 2016 | Fuzz | ||
Unicorn: Next Generation CPU Emulator Framework | NGUYEN Anh Quynh | 2015 | Emulator | |
the power of pair one template that reveals 100 plus uaf ie vulnerabilities | 2014 | Fuzz | ||
Stone Pixel Perfect Timing Attacks with HTML5 | 2013 | WebSec | ||
Dont Trust The DOM Bypassing XSS Mitigations Via Script Gadgets | Web | |||
Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing | Fuzz | |||
It's A PHP Unserialization Vulnerability Jim But Not As We Know It |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
HTTP/2: The Sequel is Always Worse | James Kettle | Director of Research, PortSwigger | 2021 | HTTP/2;smuggling |
New Ways of IPV6 Scanning | Shupeng Gao | Senior Security Researcher, Baidu | 2021 | IPv6;scan |
BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authentication | Youngman Jung | Samsung Electronics | 2019 | Bluetooth |
Booting the iOS Kernel to an Interactive Bash Shell on QEMU | Jonathan Afek | HCL/AppScan | 2019 | iOS |
Chain of Fools: An Exploration of Certificate Chain Validation Mishaps | James Barclay | Duo Security | 2019 | Cryptography |
Far Sides of Java Remote Protocols | An Trinh | Viettel Cyber Security | 2019 | Java |
Fatal Fury on ESP32: Time to Release Hardware Exploits | 2019 | |||
Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit | Chun Sung Park | Korea University | 2019 | Fuzz;RDP |
Mobile Network Hacking, IP Edition | Karsten Nohl | 2019 | Mobile | |
New Exploit Technique In Java Deserialization Attack | Yongtao Wang | BCM Social Corp | 2019 | Java;Deserialization |
Practical Side-Channel Attacks Against WPA-TKIP | Mathy Vanhoef | New York University Abu Dhabi | 2019 | WiFi |
Reverse Engineering and Exploiting Builds in the Cloud | Etienne Stalmans | Salesforce Heroku | 2019 | |
Side Channel Attacks in 4G and 5G Cellular Networks | Syed Hussain | Purdue University | 2019 | Mobile;telecommunication |
Site Isolation: Confining Untrustworthy Code in the Web Browser | Nasko Oskov | 2019 | Browser;Web | |
Sneak into Your Room: Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds | Yan Jia | NCNIPC | 2019 | IoT |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
About Directed Fuzzing and Use-After-Free: How to Find Complex & Silent Bugs? | Sébastien Bardin | 2020 | Fuzz | |
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone | Kevin Livelli | Director of Threat Intelligence, BlackBerry | 2020 | Malware |
Defending Containers Like a Ninja: A Walk through the Advanced Security Features of Docker & Kubernetes | Sheila Berta | Head of Research, Dreamlab Technologies | 2020 | Defense;Cloud |
Demystifying Modern Windows Rootkits | Bill Demirkapi | 2020 | Rootkit | |
Detecting Access Token Manipulation | William Burgess | Elastic | 2020 | Windows |
Detecting Fake 4G Base Stations in Real Time | Cooper Quintin | Senior Staff Technologist, Electronic Frontier Foundation | 2020 | Mobile |
Discovering Hidden Properties to Attack the Node.js Ecosystem | Feng Xiao | Georgia Institute of Technology | 2020 | Web |
Emulating Samsung's Baseband for Security Testing | Grant Hernandez | Security Researcher, University of Florida | 2020 | Mobile;Hardware;Emulate |
Escaping Virtualized Containers | Yuval Avrahami | Palo Alto Networks | 2020 | Virtualize |
Fooling Windows through Superfetch | Mathilde Venault | ESIEA | 2020 | Windows |
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges | Amit Klein | VP Security Research, SafeBreach | 2020 | Web |
Hiding Process Memory via Anti-Forensic Techniques | Frank Block | Security Researcher, ERNW Research GmbH | 2020 | Malware;Forensics |
Mind Games: Using Data to Solve for the Human Element | Masha Sedova | Elevate Security | 2020 | Social Enginner |
NoJITsu: Locking Down JavaScript Engines | Taemin Park | University of California, Irvine | 2020 | JavaScript |
OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts | Federico Maggi | Trend Micro Research | 2020 | Audit |
Room for Escape: Scribbling Outside the Lines of Template Security | Alvaro Muñoz;Oleksandr Mirosh | GitHub | 2020 | Web |
Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation | Szymon Ziolkowski | SensePost | 2020 | Router |
Virtually Private Networks | Charl van der Walt | Global Head of Security Research, Orange Cyberdefense | 2020 | Web |
Web Cache Entanglement: Novel Pathways to Poisoning | James Kettle | PortSwigger Web Security | 2020 | Web |
When TLS Hacks You | Joshua Maddux | Latacora | 2020 | Web |
You have No Idea Who Sent that Email: 18 Attacks on Email Sender Authentication | Jianjun Chen | 2020 | Social Enginner | |
Understanding The Attack Surface And Attack Resilience Of Project Spartans New EdgeHTML Rendering Engine | Mark Vincent Yason | IBM X-Force Advanced Research | 2015 | Edge;Attack |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Embedded Devices Security and Firmware Reverse Engineering | Jonas Zaddach | 2013 | Embedded Devices;Firmware;Reverse Engineering |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
IDN Visual Security Deep Thinking | 2019 | IDN | ||
Pass-the-Hash in Windows 10 39170 | Lukasz Cyra | 2019 | Windows;NTLM | |
Edge Type Confusion 利用 |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
A formally verified configuration for Hardware Security Modules in the cloud | Riccardo Focardi | University Ca' Foscari, Venice and Cryptosense | 2021 | Hardware;Cloud |
All your credentials are belong to us: On Insecure WPA2-Enterprise Configurations | Man Hong Hue | The Chinese University of Hong Kong | 2021 | WPA2 |
An In-Depth Symbolic Security Analysis of the ACME Standard | Karthikeyan Bhargavan | INRIA Paris, France | 2021 | ACME;Symbolic Security Analysis |
Chunk-Level Password Guessing: Towards Modeling Refined Password Composition Representations | Ming Xu | Fudan University | 2021 | Password Guessing |
DNS Cache Poisoning Attack: Resurrections with Side Channels | Keyu Man | University of California, Riverside | 2021 | DNS;Cache Poisoning |
ECMO: Peripheral Transplantation to Rehost Embedded Linux Kernels | Muhui Jiang | The Hong Kong Polytechnic University | 2021 | Embedded;Rehost |
Let's Downgrade Let's Encrypt | Tianxiang Dai | ATHENE Center & Fraunhofer SIT | 2021 | HTTPS |
New Directions in Automated Traffic Analysis | Jordan Holland | Princeton University | 2021 | Traffic |
Realtime Robust Malicious Traffic Detection via Frequency Domain Analysis | Chuanpu Fu | Tsinghua University | 2021 | Traffic;Domain |
SoFi: Reflection-Augmented Fuzzing for JavaScript Engines | Xiaoyu He | Institute of Information Engineering, Chinese Academy of Sciences | 2021 | Fuzz;JavaScript |
Spinner: Automated Dynamic Command Subsystem Perturbation | Meng Wang | University of Virginia | 2021 | Web |
T-Reqs: HTTP Request Smuggling with Differential Fuzzing | Bahruz Jabiyev | Northeastern University | 2021 | HTTP;Differential Fuzzing |
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization | Wenna Song | Wuhan University | 2021 | Android;Virtualization |
V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Fuzzing | Gaoning Pan | Ant Group | 2021 | Hypervisor;Fuzzing |
Bypassing Tor Exit Blocking with Exit Bridge Onion Services | Zhao Zhang | Georgetown University | 2020 | Tor |
CLAPS: Client-Location-Aware Path Selection in Tor | Florentin Rochet | UCLouvain | 2020 | Tor |
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | Keyu Man,Zhiyun Qian | University of California, Riverside | 2020 | DNS cache poisoning;side channel |
DNS Cache Poisoning Attack Reloaded: Revolutions with Side Channels | Keyu Man | University of California, Riverside | 2020 | DNS |
PMForce: Systematically Analyzing postMessage Handlers at Scale | Marius Steffens | CISPA | 2020 | Web |
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback | Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, Dinghao Wu | Software Systems Security Team at Penn State University | 2020 | Fuzz;SQL |
The Cookie Hunter: Automated Black-box Auditing for WebAuthentication and Authorization Flaws | Kostas Drakonakis | FORTH ICS, Greece | 2020 | Web;Auth |
TrafficSliver: Fighting Website Fingerprinting Attacks with Traffic Splitting | Wladimir De la Cadena | University of Luxembourg | 2020 | Web;Fingerprinting |
Zombie Awakening: Stealthy Hijacking of Active Domains through DNS Hosting Referral | Eihal Alowaisheq | Indiana University | 2020 | DNS |
1 Trillion Dollar Refund – How To Spoof PDF Signatures | Vladislav Mladenov | Ruhr University Bochum | 2019 | |
Charting the Attack Surface of Trigger-Action IoT Platforms | Qi Wang | University of Illinois at Urbana-Champaign | 2019 | IoT |
LibreCAN: Automated CAN Message Translator | Mert D. Pesé | University of Michigan | 2019 | CAN |
Matryoshka: fuzzing deeply nested branches | Peng Chen | ByteDance AI Lab | 2019 | Fuzz |
Principled Unearthing of TCP Side Channel Vulnerabilities | Yue Cao | UC Riverside | 2019 | TCP;Side Channel |
Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack | Hoai Viet Nguyen | Cologne University of Applied Sciences, Germany | 2019 | Web;Cache |
Hawkeye: towards a desired directed grey box fuzzer | 2018 | Fuzz | ||
Code-Reuse Attacks for the Web Breaking Cross-Site Scripting Mitigations via Script Gadgets | 2017 | Web XSS | ||
Designing New Operating Primitives to Improve Fuzzing Performance | Wen Xu | Georgia Institute of Technology Virginia Tech | 2017 | Fuzz;Speed |
Designing New Operating Primitives to Improve Fuzzing Performance | Wen Xu | Georgia Institute of Technology Virginia Tech | 2017 | Fuzz;Speed |
Directed Greybox Fuzzing | 2017 | Fuzz | ||
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities | los Petsios | Columbia University | 2017 | Fuzz |
Coverage-based Greybox Fuzzing as Markov Chain | Marcel Böhme | School of Computing, National University of Singapore | 2016 | Fuzz |
25 Million flows later - Large-scale detection of DOM-based XSS | 2013 | |||
Tappan Zee (North) Bridge: Mining Memory Accesses for Introspection | Brendan Dolan-Gavitt | Georgia Tech | 2013 | Introspection;reverse engineering |
Block Oriented Programming Automating Data-Only Attacks | Exploit | |||
Deterministic Browser | Browser | |||
HyCC: Compilation of Hybrid Protocols for Practical Secure Computation | Fuzz | |||
IMF Infeered Model-based Fuzzer | Fuzz | |||
POISED Spotting Twitter Spam Off the Beaten Paths | Spam | |||
Predicting Impending Exposure to Malicious Content from User Behavior | ||||
Rewriting History Changing the Archived Web from the Present | ||||
SemFuzz Semantics-based Automatic Generation of Proof-of-Concept Exploits | Fuzz | |||
The TypTop System Personalized Typo-Tolerant Password Checking | ||||
Threat Intelligence Computing | Threat Intelligence | |||
Trends, challenge, and shifts in software vulnerability mitigation | ||||
Web Sixth Sense A Study of Scripts Accessing Smartphone Sensors | ||||
When Good Components Go Bad Formally Secure Compilation Despite Dynamic Compromise | ||||
Yet Another Text Captcha Solver A Generative Adversarial Network Based Approach |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Your IoTs Are (Not) Mine: On the Remote BindingBetween IoT Devices and Users | Jiongyi Chen | The Chinese University of Hong Kong | 2019 | IoT |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Extension-Land - exploits and rootkits in your browser extensions | Barak Sternberg | SentinelOneLabs | 2021 | brower extension |
Offensive Golang Bonanza - Writing Golang Malware | Ben Kurtz | 2021 | Golang;Malware | |
Firmware slap: automating discovery of exploitable vulnerabilities in firmware | Christopher roberts | 2019 | Firmware | |
Analysis of Mutation and Generation Based Fuzzing | Fuzz | |||
geoff mcdonald meddle framework updated | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Boosting Fuzzer Efficiency:An Information Theoretic Perspective | Marcel Böhme | Monash University | 2020 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
CrFuzz: Fuzzing Multi-purpose Programs through Input Validation | Suhwan Song | Seoul National University | 2020 | Fuzz |
Detecting Critical Bugs in SMT Solvers using Blackbox Mutational Fuzzing | Muhammad Numair Mansur | MPI-SWS, Germany | 2020 | Fuzz |
Fuzzing: On the Exponential Cost of Vulnerability Discovery | Marcel Böhme | Monash University, Australia | 2020 | Fuzz |
MTFuzz: Fuzzing with a Multi-task Neural Network | Dongdong She | Columbia University | 2020 | Fuzz |
Steelix: Program-State Based Binary Fuzzing | Yuekang Li | Nanyang Technological University | 2017 | Fuzz |
KATCH High-Coverage Testing of Software Patches | Paul Dan Marinescu | 2013 | Fuzz;Patch |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Embedded Research & Automation | Brian Butterly | 2019 | Embedded;Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Building Next-Gen Security Analysis Tools With Qiling Framework | KaiJern LAU | qiling.io | 2020 | Emulation |
Static Code Analysis Recognition Evasion | Andreas Wiegenstein | AP Cyber Security | 2019 | Code Analysis |
From Out of Memory to Remote Code Execution | Yuki Chen | 2017 | Fuzz | |
The ECMA and The Chakra | Natalie Silvanovich | Fuzz | ||
The Secret of ChakraCore |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
MemLock: Memory Usage Guided Fuzzing | Cheng Wen | Shenzhen University;Ant Financial | 2020 | Fuzz;AFL |
Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities | Haijun Wang | Ant Financial Services Group | 2020 | Fuzz;UAF |
DifFuzz Differential Fuzzing for Side-Channel Analysis | Shirin Nilizadeh | uta.edu | 2019 | Differential Fuzz |
REST-ler: Automatic Intelligent REST API Fuzzing | Vaggelis Atlidakis | Columbia University | 2019 | Fuzz Web RESTful |
SLF: Fuzzing without Valid Seed Inputs | Wei You | Purdue University | 2019 | Fuzz |
Superion Grammar-Aware Greybox Fuzzing | Junjie Wang | Fudan University | 2019 | Fuzz;AST |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
AFLNET: A Greybox Fuzzer for Network Protocols | Van-Thuan Pham | Monash University | 2020 | Fuzz; Network |
SeqFuzzer An Industrial Protocol Fuzzing Framework in Deep Learning Perspective | Hui Zhao | National Trusted Embedded Software Engineering Technology Research Center | 2019 | Fuzz |
SeqFuzzer: An Industrial Protocol Fuzzing Framework in Deep Learning Perspective | Nicolas Coppik | DEEDS Group, TU Darmstadt | 2019 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
End User and Administrator Mental Models of HTTPS | 2019 | Web | ||
Full-speed Fuzzing Reducing Fuzzing Overhead through Coverage-guided Tracing | 2019 | Fuzz | ||
Fuzzing File Systems via Two-Dimensional Input Space Exploration | 2019 | Fuzz | ||
HOLMES Real-time APT Detection through Correlation of Suspicious Information Flows | 2019 | APT | ||
ProFuzzer On-the-fly Input Type Probing for Better Zero-day Vulnerability Discovery | 2019 | Fuzz | ||
RAZZER Finding Kernel Race Bugs through Fuzzing | 2019 | Fuzz Kernel Race | ||
Resident Evil Understanding Residential IP Proxy as a Dark Service | 2019 | 生态 | ||
Angora: Efficient Fuzzing by Principled Search | Peng Chen | 2018 | Fuzz | |
GramFuzz: Fuzzing Testing of Web Browsers Based on Grammar Analysis and Structural Mutation | 2013 | Fuzz | ||
Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models | Fuzz | |||
CollAFL Path Sensitive Fuzzing | Fuzz | |||
Research on Android browser fuzzing based on bitmap structure | Fuzz | |||
Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations | Fuzz | |||
Violating Assumptions with Fuzzing | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd | Mathy Vanhoef | New York University Abu Dhabi | 2020 | Wifi |
IJON: Exploring Deep State Spaces via Fuzzing | Cornelius Aschermann, Sergej Schumilo, Ali Abbasi, and Thorsten Holz | Ruhr University Bochum | 2020 | Fuzz |
KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware | Nilo Redini | ucsb-seclab | 2020 | Embedded |
PANGOLIN: Incremental Hybrid Fuzzing with Polyhedral Path Abstraction | Heqing Huang | The Hong Kong University of Science and Technology, China | 2020 | Fuzz |
SAVIOR: Towards Bug-Driven Hybrid Testing | 2020 | Fuzz;Hybrid | ||
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection | Tielei Wang | 2020 | taint;fuzz | |
Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing | Stefan Nagy | Virginia Tech | 2019 | Fuzz |
T-Fuzz: fuzzing by program transformation | Hui Peng | Purdue University | 2018 | Fuzz;Black Box |
Finding and preventing bugs in JavaScript bindings | Fraser Brown | Stanford University | 2017 | Fuzz;JavaScript |
HVLearn: Automated black-box analysis of hostname verification in SSL/TLS implementations | Sivakorn | 2017 | Fuzz | |
NEZHA: Efficient Domain-Independent Differential Testing | 2017 | Fuzz;Differential | ||
(State of) The Art of War: Offensive Techniques in Binary Analysis | Yan Shoshitaishvili | UCSB | 2016 | Angr;Binary Analysis |
The Limitations of Deep Learning in Adversarial Settings | Nicolas Papernot | 2016 | GAN;Machine Learning | |
The BORG: Nanoprobing Binaries for Buffer Overreads | Matthias Neugschwandtner | Vienna University of Technology | 2015 | Fuzz;Taint |
Skyfire Data Driven Seed Generation for Fuzzing | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Learn&Fuzz: Machine Learning for Input Fuzzing | Godefroid | 2017 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Locate Then Detect:Web Attack Detection via Attention-based Deep Neural Networks | Tianlong Liu,Jianan Yan | Ali | 2019 | Web;Machine Learning;WAF |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Active Fuzzing for Testing and Securing Cyber-Physical Systems | Yuqi Chen | Singapore Management University | 2020 | Fuzz |
Learning Input Tokens for Effective Fuzzing | Björn Mathis | CISPA Helmholtz Center for Information Security | 2020 | Fuzz |
WEIZZ: Automatic Grey-Box Fuzzingfor Structured Binary Formats | Andrea Fioraldi | Sapienza University of RomeItaly | 2020 | Fuzz;Structured |
DeepHunter: A Coverage-Guided Fuzz Testing Framework for Deep Neural Networks | Xiaofei Xie | Nanyang Technological University | 2019 | Fuzz |
Deferred Concretization in Symbolic Execution via Fuzzing | Awanish Pandey | Computer Sc. and Engg. | 2019 | Fuzz |
Semantic Fuzzing with Zest | Rohan Padhye | University of California, Berkeley | 2019 | Fuzz |
Badger: Complexity Analysis with Fuzzing and Symbolic Execution | Yannic Noller | Humboldt University of Berlin | 2018 | Fuzz |
Compiler Fuzzing through Deep Learning | Chris Cummins | Pavlos Petoumenos | 2018 | Fuzz |
PerfFuzz: Automatically Generating Pathological Inputs | Caroline Lemieux | University of California, Berkeley, USA | 2018 | Fuzz |
Make It Work, Make It Right, Make It Fast: Building a Platform-Neutral Whole-System Dynamic Binary Analysis Platform | Andrew Henderson | Department of EECS | 2014 | binary analysis;taint analysis;virtual machine introspection |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
neural fuzzing mcr | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Bitcoin: A Peer-to-Peer Electronic Cash System | Satoshi Nakamoto | Bitcoin.Org | 2008 | Bitcoin |
Tor: The Second-Generation Onion Router | Dingledine | Naval Research Lab Washington DC | 2004 | Tor |
Critical Vulnerability in Browser Security Metrics | Fuzz | |||
Drive by Key Extraction Cache Attacks from Portable Code | Fuzz | |||
Escaping Internet Explorer Protected Mode | Fuzz | |||
Fuzzing JavaScript Engine APIs | Fuzz | |||
Test Harness For Web Browser Fuzz Testing | Fuzz | |||
The Security Architecture of the Chromium Browser | Fuzz | |||
X41 Browser Security White Paper | Fuzz | |||
browser ui security whitepaper | Fuzz | |||
cure53 browser security whitepaper | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Cross-Origin State Inference (COSI) Attacks: Leaking Web Site States through XS-Leaks | Avinash Sudhodanan | IMDEA Software Institute | 2020 | Web;Frontend |
Deceptive Previews: A Study of the Link Preview Trustworthiness in Social Platforms | Giada Stivala | CISPA | 2020 | Web;Social |
HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing | William Blair | Boston University | 2020 | Fuzz;SlowFuzz |
Melting Pot of Origins: Compromising the Intermediary Web Services that Rehost Websites | Takuya Watanabe | NTT | 2020 | Web |
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization | Yanhao Wang | Institute of Software, Chinese Academy of Sciences | 2020 | Fuzz |
A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems | Cheng Feng | Imperial College London | 2019 | ICS |
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification | Sze Yiu Chau | Purdue University | 2019 | Fuzz;Symbolic Execution |
BadBluetooth Breaking Android Security Mechanisms via Malicious Bluetooth Peripherals | Fenghao Xu | The Chinese University of Hong Kong | 2019 | Bluetooth |
CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines | HyungSeok Han | KAIST | 2019 | Fuzz |
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems | Tigist Abera | Technische Universität Darmstadt | 2019 | IoT |
DIAT: Data Integrity Attestation for Resilient Collaboration of Autonomous Systems | Z. Berkay Celik | Penn State University | 2019 | IoT |
DNS Cache-Based User Tracking | Amit Klein | Bar Ilan University | 2019 | DNS;Privacy |
Distinguishing Attacks from Legitimate Authentication Traffic at Scale | Cormac Herley | Microsoft | 2019 | Side Channel |
Don’t Trust The Locals: Investigating the Prevalence of Persistent Client-Side Cross-Site Scripting in the Wild | 2019 | XSS | ||
How Bad Can It Git? Characterizing Secret Leakage in Public GitHub Repositories | Michael Meli | North Carolina State University | 2019 | Privacy;Git |
ICSREF: A Framework for Automated Reverse Engineering of Industrial Control Systems Binaries | Anastasis Keliris | NYU | 2019 | IoT;Reverse Engineering |
IOTFUZZER: Discovering Memory Corruptions in IoT Through App-based Fuzzing | Jiongyi Chen | The Chinese University of Hong Kong | 2019 | IoT;Fuzz |
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits | Michael Schwarz | Graz University of Technology | 2019 | Side;Channel |
Master of Web Puppets: Abusing Web Browsers for Persistent and Stealthy Computation | Panagiotis Papadopoulos | FORTH-ICS | 2019 | Web;HTML5;Browseer API |
NAUTILUS:Fishing for Deep Bugs with Grammars | 2019 | Fuzz;Browser | ||
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs | 2019 | NLP Binary | ||
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics | Zheng Leong Chua | National University of Singapore | 2019 | |
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary | Dokyung Song | University of California, Irvine | 2019 | Fuzz;Hardware |
Profit: Detecting and Quantifying Side Channels in Networked Applications | Nicolás Rosner | University of California, Santa Barbara | 2019 | Side Channel |
REDQUEEN: Fuzzing with Input-to-State Correspondence | Cornelius Aschermann,Sergej Schumilo,Tim Blazytko,Robert Gawlik and Thorsten Holz | 2019 | Fuzz | |
REDQUEEN: Fuzzing with Input-to-State Correspondence | Cornelius Aschermann, Sergej Schumilo, Tim Blazytko, Robert Gawlik, Thorsten Holz | Ruhr-Universität Bochum | 2019 | Fuzzing |
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing | Lei Zhao | Wuhan University | 2019 | Hybrid Fuzzing |
Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing | Lei Zhao | Wuhan University | 2019 | Fuzz |
Synode: Understanding and Automatically Preventing Injection Attacks on Node.js | SOLA | 2019 | Web;Auomatica | |
TextBugger: Generating Adversarial Text Against Real-world Applications | Jinfeng Li | Zhejiang University | 2019 | Adversarial |
Unveiling your keystrokes: A Cache-based Side-channel Attack on Graphics Lib | Daimeng Wang | University of California Riverside | 2019 | Side-channel |
What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices | Marius Muench | EURECOM | 2018 | Fuzz;Embedded |
VUzzer Application-aware Evolutionary Fuzzing | Sanjay Rawat | 2017 | Fuzz | |
Driller: Augmenting Fuzzing Through Selective Symbolic Execution | Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna | UCSB | 2016 | Fuzz;Selective Symbolic Execution |
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware | Daming D. Chen | CMU | 2016 | Firmware |
Avatar: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares | Jonas Zaddach | EURECOM, France | 2014 | Fuzz;Firmware |
VulDeePecker |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Compiler Fuzzing: How Much Does It Matter? | MICHAËL MARCOZZI | Imperial College London, United Kingdom | 2019 | Fuzz |
FuzzFactory: Domain-Specific Fuzzing with Waypoints | Rohan Padhye | University of California at Berkeley, USA | 2019 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Attacking Edge Through the JavaScript Compiler | 2019 | Exploit | ||
Chrome IPC Exploitation | 2019 | Exploit | ||
Coverage-Guided USB Fuzzing with Syzkaller | 2019 | Fuzz | ||
Fuzzil: Guided Fuzzing for JavaScript Engines | Samuel Groß | 2019 | Fuzz | |
From Assembly to JavaScript and back | 2018 |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Parser-Directed Fuzzing | Mathis | cispa | 2019 | Fuzz |
Coverage-Directed Differential Testing of JVM Implementations | Yuting Chen | SJTU | 2016 | Fuzz;JVM;Differential |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Attacking Modern Web Technologies | 2018 | HTML5 Security | ||
php internals exploit dev | 2018 | PHP Fuzz | ||
BrowserFuzzing | 2014 | |||
1day browser exploitaion | Fuzz | |||
Blink Rendering | Fuzz | |||
OffensiveCon2018 From Assembly to JavaScript and back | Fuzz | |||
Taking Browsers Fuzzing to the next (DOM) Level | Fuzz | |||
ZeroNights2017 darko fuzzer | Fuzz | |||
the art of fuzzing slides | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
PowerFL: Fuzzing VxWorks embedded system | Peter Goodman | 2019 | Embedded;Fuzz;IoT |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
CRYPTOREX: Large-scale Analysis of Cryptographic Misuse in IOT Devices | Li Zhang | Jinan University | 2019 | Crypto;IoT |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
ACIDRain: Concurrency-Related Attacks on Database-Backed Web Applications | Todd Warszawski | Stanford InfoLab | 2017 | Web |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Parser-Directed Fuzzing | 2019 | Fuzz | ||
Synthesizing program input grammars | Osbert Bastani | 2017 | Fuzz | |
Fast and Precise Hybrid Type Inference for JavaScript | Brian Hackett | Mozilla | 2012 | Fuzz;JavaScript |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Chakra vulnerability and exploit bypass all system mitigation | ||||
Shellcodes are for the 99% | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Smart Greybox Fuzzing | Van-Thuan Pham | 2019 | Fuzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Soteria: Automated IoT Safety and Security Analysis | Z.Berkay Celik | The Pennsylvania State University | 2018 | IoT |
Gdev: First-Class GPU Resource Management in the Operating System | Shinpei Kato | Department of Computer Science, UC Santa Cruz | 2012 | GPU |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion | 2021 | AI | ||
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | Yousra Aafer | University of Waterloo | 2021 | Fuzz;IoT |
Automatic Firmware Emulation through Invalidity-guided Knowledge Inference | Wei Zhou | National Computer Network Intrusion Protection Center, University of Chinese Academy of Sciences | 2021 | Emulation;IoT |
Automatic Policy Generation for Inter-Service Access Control of Microservices | Xing Li | Zhejiang University | 2021 | Microservice;Policy |
Blind In/On-Path Attacks and Applications to VPNs | William J. Tolley | Breakpointing Bad/Arizona State University | 2021 | VPN;Hijack |
Causal Analysis for Software-Defined Networking Attacks | Benjamin E. Ujcich | Georgetown University | 2021 | SDN |
Constraint-guided Directed Greybox Fuzzing | Gwangmu Lee | Seoul National University | 2021 | Greybox Fuzz; |
Fine Grained Dataflow Tracking with Proximal Gradients | Gabriel Ryan | Columbia University | 2021 | Taint Analysis |
Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets | Pierre Laperdrix | Univ. Lille, CNRS, Inria | 2021 | Fingerprint;Browser |
Jetset: Targeted Firmware Rehosting for Embedded Systems | Evan Johnson | University of California, San Diego | 2021 | Firmware;Rehosting |
LZR: Identifying Unexpected Internet Services | Liz Izhikevich | Stanford University | 2021 | port scan |
ReDMArk: Bypassing RDMA Security Mechanisms | Benjamin Rothenberger | 2021 | RDMA | |
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries | Dario Pasquini | Sapienza University of Rome, Institute of Applied Computing CNR | 2021 | Auth |
Weak Links in Authentication Chains: A Large-scale Analysis of Email Sender Spoofing Attacks | Kaiwen Shen | Tsinghua University | 2021 | |
Weaponizing Middleboxes for TCP Reflected Amplification | Kevin Bock | University of Maryland; Abdulrahman Alaraj | 2021 | Web;DoS |
A Longitudinal and Comprehensive Study of the DANE Ecosystem in Email | Hyeonmin Lee | Seoul National University | 2020 | Email;DNS |
AURORA: Statistical Crash Analysis for Automated Root Cause Explanation | Tim Blazytko | Ruhr-Universität Bochum | 2020 | Automated |
Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints | Dokyung Song | University of California, Irvine | 2020 | Fuzz;Kernel |
Analysis of DTLS Implementations Using Protocol State Fuzzing | Paul Fiterau-Brostean | Uppsala University | 2020 | Fuzz |
Automatic Techniques to Systematically Discover New Heap Exploitation Primitives | Insu Yun | Georgia Institute of Technology | 2020 | Heap;Exploit |
Cached and Confused: Web Cache Deception in the Wild | Seyed Ali Mirheidari | University of Trento | 2020 | Cache Deception |
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit | Tai Yue | National University of Defense Technology | 2020 | Fuzz |
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as aVariant of the Adversarial Multi-Armed Bandit | Tai Yue, Pengfei Wang, Yong Tan | National University of Defense Technology | 2020 | Fuzz;AI |
FANS: Fuzzing Android Native System Services via Automated Interface Analysis | Baozheng Liu,Chao Zhang | Tsinghua University | 2020 | Fuzz;Android |
Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets | Jan Ruge | Secure Mobile Networking Lab, TU Darmstadt | 2020 | Fuzz;Bluetooth;Emulate;Firmware |
FuzzGen: Automatic Fuzzer Generation | Kyriakos Ispoglou | Daniel Austin | 2020 | Fuzz |
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning | Peiyuan Zong | IIE | 2020 | Fuzz;Deep Learning |
FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzingthrough Deep Learning | Peiyuan Zong | UCAS | 2020 | Fuzz |
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection | Zu-Ming Jiang | Tsinghua University | 2020 | Fuzz |
GREYONE: Data Flow Sensitive Fuzzing | Shuitao Gan | State Key Laboratory of Mathematical Engineering and Advanced Computing | 2020 | Fuzz |
HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation | Abraham A Clements | Sandia National Laboratories | 2020 | Firmware |
KOOBE: Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities | Weiteng Chen | UC Riverside | 2020 | OOB;Exploit |
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs | Hongxu Chen | University of Science and Technology of China and Nayang Technological University | 2020 | Fuzz |
Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer | Suyoung Lee | KAIST | 2020 | Fuzz;NN |
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities | Lior Shafir | Tel Aviv University | 2020 | DNS;DoS |
NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities | Yehuda Afek | Tel-Aviv University | 2020 | DNS |
P2IM Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling | Bo Feng, Alejandro Mera, and Long Lu | Northeastern University | 2020 | Fuzz |
ParmeSan: Sanitizer-guided Greybox Fuzzing | Sebastian Österlund | Vrije Universiteit Amsterdam | 2020 | Fuzz |
Poison Over Troubled Forwarders: A Cache Poisoning Attack Targeting DNS Forwarding Devices | Xiaofeng Zheng | Tsinghua University | 2020 | DNS;Cache Poisoning |
Symbolic execution with SymCC: Don't interpret, compile! | Sebastian Poeplau | EURECOM | 2020 | Fuzz |
Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code | Fraser Brown, Stanford University; Deian Stefan, UC San Diego; Dawson Engler, Stanford University | Stanford University | 2020 | Browser;Vuln Discovery |
The Industrial Age of Hacking | Timothy Nosco | United States Army | 2020 | Training |
USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation | Hui Peng | Purdue University | 2020 | Fuzz;Emulation |
All Your Clicks Belong to Me: Investigating Click Interception on the Web | Mingxue Zhang and Wei Meng | Pennsylvania State University | 2019 | Web;Click hijack |
An Empirical Analysis of Single Sign-On Account Hijacking and Session Management on the Web | 2019 | Web, SSO | ||
Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms | Wei Zhou | IIE | 2019 | IoT |
EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers | Yuanliang Chen, Yu Jiang, Fuchen Ma, Jie Liang, Mingzhe Wang, Chijin Zhou | Tsinghua University | 2019 | Fuzz |
FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation | Yaowen Zheng | School of Cyber Security, University of Chinese Academy of Sciences, China | 2019 | Fuzz;Firm |
GRIMOIRE: Synthesizing Structure while Fuzzing | Tim Blazytko, Cornelius Aschermann, Moritz Schlögel, Ali Abbasi, Sergej Schumilo, Simon Wörner | Ruhr-Universität Bochum | 2019 | Fuzz |
Leaky Images: Targeted Privacy Attacks in the Web | Cristian-Alexandru Staicu and Michael Pradel | TU Darmstadt | 2019 | Web;Side Channel |
MOPT-Optimized Mutation Scheduling for Fuzzers | 2019 | Fuzz | ||
Mobile Private Contact Discovery at Scale | Daniel Kales | Graz University of Technology | 2019 | Mobile |
The KNOB is Broken: Exploiting Low Entropy in the Encryption Key Negotiation Of Bluetooth BR/EDR | Daniele Antonioli | SUTD | 2019 | Bluetooth;protocol |
Toward the Analysis of Embedded Firmware through Automated Re-hosting | Eric Gustafson | UCSB | 2019 | Firmware;virtualize |
An Empirical Study of CORS | 2018 | CORS | ||
Empirical Analysis of Redirection Hijacking in Content Delivery Networks | 2018 | CDN | ||
Fuze | 2018 | |||
Fuzzing with Code Fragments | 2018 | Fuzz | ||
Watermarking Deep Neural Networks by Backdooring | 2018 | Deep Learning | ||
Syntia: Synthesizing the Semantics of Obfuscated Code | 2017 | Obfuscate | ||
Stealing Machine Learning Models via Prediction APIs | Florian Tramer | 2016 | Model Stealing | |
k-fingerprinting A Robust Scalable Website Fingerprinting Technique | 2016 | fingerprint | ||
Effective Attacks and Provable Defenses for Website Fingerprinting | 2014 | Fingerprint | ||
Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations | Istvan Haller | VU University Amsterdam | 2013 | Guied Fuzz |
ZMap: Fast Internet-wide Scanning and Its Security Applications | Zakir Durumeric | University of Michigan | 2013 | scanner |
Author Attribute Anonymity by Adversarial Training of Neural Machine Translation | ||||
Automatic Generation of Data-Oriented Exploits | ||||
Fortifying Web Protocols via Browser-Side Security Monitoring | ||||
Generalized Transferability for Evasion and Poisoning Attacks | ||||
MoonShine Optimizing OS Fuzzer Seed Selection with Trace Distillation | ||||
NAVEX Precise and Scalable Exploit Generation for Dynamic Web Applications | ||||
Optimizing seed selection for fuzzing | Fuzz | |||
QSYM A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing | ||||
Reverse Engineering Ethereum’s Opaque Smart Contracts | ||||
SoK Make JIT-Spray Great Again | ||||
Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing | Dominik Maier, Benedikt Radtke, and Bastian Harren, TU Berlin | TU Berlin | 2019 | Unicorn;FUzz |
Title | Authors | Organization | Year | Keywords |
---|---|---|---|---|
Android Enterprise Security White Paper | 2019 | Android | ||
Hardwear 2018 BLE Security Essentials | Smartlockpicking.com | 2018 | BLE |
To make the paper more accessible, please place the PDF version of the paper in the repo. All pdfs are collected from the Internet. If this article violates your copyright, please contact me to delete it.