Jan. 5, 2024, 2:10 a.m. | Xiaohan Zhang, Cen Zhang, Xinghua Li, Zhengjie Du, Yuekang Li, Yaowen Zheng, Yeting Li, Bing Mao, Yang Liu, Robert H. Deng

cs.CR updates on arXiv.org arxiv.org

Communication protocols form the bedrock of our interconnected world, yet
vulnerabilities within their implementations pose significant security threats.
Recent developments have seen a surge in fuzzing-based research dedicated to
uncovering these vulnerabilities within protocol implementations. However,
there still lacks a systematic overview of protocol fuzzing for answering the
essential questions such as what the unique challenges are, how existing works
solve them, etc. To bridge this gap, we conducted a comprehensive investigation
of related works from both academia and industry. …

bedrock communication fuzzing protocol protocols questions research security security threats survey threats vulnerabilities world

Assistant Manager, IT Security

@ CIMB | Cambodia

IT Security Engineer - GRC

@ Xtremax | Bandung City, West Java, Indonesia

Senior Engineer - Application Security

@ ANZ Banking Group Limited | Quezon City, PH

Penetration Tester Manager

@ RSM | USA-IL-Chicago-30 South Wacker Drive, Suite 3300

Offensive Security Engineer, Device Wireless Connectivity

@ Google | Amsterdam, Netherlands

IT Security Analyst I

@ Mitsubishi Heavy Industries | Houston, TX, US, 77046