Imperial College London

ProfessorCristianCadar

Faculty of EngineeringDepartment of Computing

Professor of Software Reliability
 
 
 
//

Contact

 

c.cadar Website

 
 
//

Location

 

435Huxley BuildingSouth Kensington Campus

//

Summary

 

Publications

Citation

BibTex format

@article{Boehme:2020:10.1109/ms.2020.3016773,
author = {Boehme, M and Cadar, C and ROYCHOUDHURY, A},
doi = {10.1109/ms.2020.3016773},
journal = {IEEE Software},
pages = {79--86},
title = {Fuzzing: challenges and reflections},
url = {http://dx.doi.org/10.1109/ms.2020.3016773},
volume = {38},
year = {2020}
}

RIS format (EndNote, RefMan)

TY  - JOUR
AB - Abstract—Fuzzing is a method to discover software bugs and vulnerabilities by automatic test input generation which has found tremendous recent interest in both academia and industry. Fuzzing comes in the form of several techniques. On one hand, we have symbolic execution, which enables a particularly effective approach to fuzzing by systematically enumerating the paths of a program. On the other hand, we have random input generation, which generates large amounts of inputs per second with none or minimal program analysis overhead. In this article, we summarize the open challenges and opportunities for fuzzing and symbolic execution as they emerged in discussions among researchers and practitioners in a Shonan Meeting, and were validated in a subsequent survey. We take a forward-looking view of the software vulnerability discovery technologies and provide concrete directions for future research.
AU - Boehme,M
AU - Cadar,C
AU - ROYCHOUDHURY,A
DO - 10.1109/ms.2020.3016773
EP - 86
PY - 2020///
SN - 0740-7459
SP - 79
TI - Fuzzing: challenges and reflections
T2 - IEEE Software
UR - http://dx.doi.org/10.1109/ms.2020.3016773
UR - https://ieeexplore.ieee.org/document/9166552
UR - http://hdl.handle.net/10044/1/83347
VL - 38
ER -