pith. sign in

arxiv: 1812.00140 · v4 · pith:7L35YZ47new · submitted 2018-12-01 · 💻 cs.CR · cs.SE

The Art, Science, and Engineering of Fuzzing: A Survey

classification 💻 cs.CR cs.SE
keywords fuzzingliteratureengineeringmodelsciencesoftwarevastalike
0
0 comments X p. Extension
pith:7L35YZ47 Add to your LaTeX paper What is a Pith Number?
\usepackage{pith}
\pithnumber{7L35YZ47}

Prints a linked pith:7L35YZ47 badge after your title and writes the identifier into PDF metadata. Compiles on arXiv with no extra files. Learn more

read the original abstract

Among the many software vulnerability discovery techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of empirical evidence in discovering real-world software vulnerabilities. At a high level, fuzzing refers to a process of repeatedly running a program with generated inputs that may be syntactically or semantically malformed. While researchers and practitioners alike have invested a large and diverse effort towards improving fuzzing in recent years, this surge of work has also made it difficult to gain a comprehensive and coherent view of fuzzing. To help preserve and bring coherence to the vast literature of fuzzing, this paper presents a unified, general-purpose model of fuzzing together with a taxonomy of the current fuzzing literature. We methodically explore the design decisions at every stage of our model fuzzer by surveying the related literature and innovations in the art, science, and engineering that make modern-day fuzzers effective.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. MASFuzzer: Fuzz Driver Generation and Adaptive Scheduling via Multidimensional API Sequences

    cs.SE 2026-04 unverdicted novelty 5.0

    MASFuzzer generates fuzz drivers via mined multidimensional API sequences and adaptive scheduling, delivering 8.54% higher code coverage and 16 new vulnerabilities across 12 libraries.