Typestate-guided fuzzer for discovering use-after-free vulnerabilities

Existing coverage-based fuzzers usually use the individual control flow graph (CFG) edge coverage to guide the fuzzing process, which has shown great potential in finding vulnerabilities. However, CFG edge coverage is not effective in discovering vulnerabilities such as use-after-free (UaF). This is...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Haijun, XIE, Xiaofei, LI, Yi, WEN, Cheng, LI, Yuekang, LIU, Yang, QIN, Shengchao, CHEN, Hongxu, SUI, Yulei
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2020
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7086
https://ink.library.smu.edu.sg/context/sis_research/article/8089/viewcontent/3377811.3380386__1_.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English

Similar Items