Authors
Christopher Salls, Chani Jindal, Jake Corina, Christopher Kruegel, Giovanni Vigna
Publication date
2021
Conference
30th USENIX Security Symposium (USENIX Security 21)
Pages
2795–2809
Description
Fuzzing has become a commonly used approach to identifying bugs in complex, real-world programs. However, interpreters are notoriously difficult to fuzz effectively, as they expect highly structured inputs, which are rarely produced by most fuzzing mutations. For this class of programs, grammar-based fuzzing has been shown to be effective. Tools based on this approach can find bugs in the code that is executed after parsing the interpreter inputs, by following language-specific rules when generating and mutating test cases.
Total citations
20212022202320241745
Scholar articles
C Salls, C Jindal, J Corina, C Kruegel, G Vigna - 30th USENIX Security Symposium (USENIX Security …, 2021