Dec. 20, 2022, 2:10 a.m. | Seemanta Saha, Laboni Sarker, Md Shafiuzzaman, Chaofan Shou, Albert Li, Ganesh Sankaran, Tevfik Bultan

cs.CR updates on arXiv.org arxiv.org

Starting with a random initial seed, fuzzers search for inputs that trigger
bugs or vulnerabilities. However, fuzzers often fail to generate inputs for
program paths guarded by restrictive branch conditions. In this paper, we show
that by first identifying rare-paths in programs (i.e., program paths with path
constraints that are unlikely to be satisfied by random input generation), and
then, generating inputs/seeds that trigger rare-paths, one can improve the
coverage of fuzzing tools. In particular, we present techniques 1) that …

fuzzing seed

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain