Authors
Kyriakos Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer
Publication date
2020
Conference
29th USENIX Security Symposium (USENIX Security 20)
Pages
2271-2287
Description
Fuzzing is a testing technique to discover unknown vulnerabilities in software. When applying fuzzing to libraries, the core idea of supplying random input remains unchanged, yet it is non-trivial to achieve good code coverage. Libraries cannot run as standalone programs, but instead are invoked through another application. Triggering code deep in a library remains challenging as specific sequences of API calls are required to build up the necessary state. Libraries are diverse and have unique interfaces that require unique fuzzers, so far written by a human analyst.
Total citations
2019202020212022202320241325373814
Scholar articles
K Ispoglou, D Austin, V Mohan, M Payer - 29th USENIX Security Symposium (USENIX Security …, 2020