Jan. 13, 2022, 2:20 a.m. | Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen

cs.CR updates on arXiv.org arxiv.org

Coverage-guided Greybox Fuzzing (CGF) is one of the most successful and
widely-used techniques for bug hunting. Two major approaches are adopted to
optimize CGF: (i) to reduce search space of inputs by inferring relationships
between input bytes and path constraints; (ii) to formulate fuzzing processes
(e.g., path transitions) and build up probability distributions to optimize
power schedules, i.e., the number of inputs generated per seed. However, the
former is subjective to the inference results which may include extra bytes for …

fuzzing path program runtime states transitions

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Computer and Forensics Investigator

@ ManTech | 221BQ - Cstmr Site,Springfield,VA

Senior Security Analyst

@ Oracle | United States

Associate Vulnerability Management Specialist

@ Diebold Nixdorf | Hyderabad, Telangana, India