Full Code of SoftSec-KAIST/Fuzzing-Survey for AI

master 41daf28f6bf8 cached
11 files
306.0 KB
89.8k tokens
53 symbols
1 requests
Download .txt
Showing preview only (315K chars total). Download the full file or copy to clipboard to get everything.
Repository: SoftSec-KAIST/Fuzzing-Survey
Branch: master
Commit: 41daf28f6bf8
Files: 11
Total size: 306.0 KB

Directory structure:
gitextract_p4wfrv2j/

├── .gitattributes
├── CNAME
├── CONTRIBUTING.md
├── COPYING.md
├── README.md
├── css/
│   └── asefuzz.css
├── data/
│   └── fuzzers.json
├── fonts/
│   └── FontAwesome.otf
├── index.html
├── js/
│   └── asefuzz.js
└── script.py

================================================
FILE CONTENTS
================================================

================================================
FILE: .gitattributes
================================================
*.json text


================================================
FILE: CNAME
================================================
fuzzing-survey.org


================================================
FILE: CONTRIBUTING.md
================================================
# Contribution Guideline

Please read this guideline before creating a pull request (PR) or an issue on
this repository.

## Inclusion Criteria

In order to ensure the quality of our database and to keep the genealogy graph
simple, we adopt the inclusion criteria we used in our survey. For a conference
paper, it should have been published in one of the following top-tier venues:

* ASE
* CCS
* FSE
* ICSE
* NDSS
* PLDI
* S&P
* USENIX Security

For an open-sourced tool, it should either have gathered at least 100 stars in
GitHub/GitLab or have been presented at Black Hat or DefCon. We do *not* include
papers that present only theoretical aspects without implementing a fuzzing tool
because this database is about the lineage of fuzzing tools. For example, our
[survey](https://ieeexplore.ieee.org/document/8863940) itself should not be
included in this database.

## Git Commit Messages

We follow the convention described in [this
article](https://chris.beams.io/posts/git-commit/).

## Adding a New Fuzzer

The database is stored in [`/data/fuzzers.json`](/data/fuzzers.json) using the
following schema. The **required** fields of each entry are:

- `name`: The name of this fuzzer. This is the key by which this fuzzer is
  referred to and must be *unique*.

- `year`: The year when this fuzzer was published.

- `targets`: The supported targets of this fuzzer. Examples include `file`,
  `network`, `kernel`, `argument`, etc.

- `color`: The degree of instrumentation of this fuzzer---blackbox, greybox, or
  whitebox.

- `references`: The `name`(s) of highly-related fuzzers, meaning other fuzzers
  that this fuzzer was implemented on top of or was heavily inspired by. To
  maintain simplicity, we limit this field to **two** entries in our database.

The following fields are *optional*, but please try to provide as much
information as possible:

- `author`: The author(s) of this fuzzer. When possible, please spell the *full
  name(s)* and not just the initials.

- `toolurl`: A URL to the source (preferred) or the executable of this fuzzer.

- `title`: The title of the conference publication/talk or the journal
  publication that presented this fuzzer.

- `booktitle`: The book title of the conference proceedings if this fuzzer first
  appeared at a conference.

- `journal`, `volume`, `number`: The journal title, volume, and number of the
  publication if this fuzzer first appeared in a journal.

- `miscurl`: Miscellaneous links, e.g., URLs to papers or presentations.

- `keywords`: Extra keywords describing this fuzzer. Make the list as concise as
  possible.

## Basic Rules for JSON

- For effective version control, please format `/data/fuzzers.json` with the
  following [`jq`](https://stedolan.github.io/jq/) command:
  ```
  jq "sort_by(.name)" fuzzers.json
  ```


================================================
FILE: COPYING.md
================================================
                    GNU GENERAL PUBLIC LICENSE
                       Version 3, 29 June 2007

 Copyright (C) 2007 Free Software Foundation, Inc. <https://fsf.org/>
 Everyone is permitted to copy and distribute verbatim copies
 of this license document, but changing it is not allowed.

                            Preamble

  The GNU General Public License is a free, copyleft license for
software and other kinds of works.

  The licenses for most software and other practical works are designed
to take away your freedom to share and change the works.  By contrast,
the GNU General Public License is intended to guarantee your freedom to
share and change all versions of a program--to make sure it remains free
software for all its users.  We, the Free Software Foundation, use the
GNU General Public License for most of our software; it applies also to
any other work released this way by its authors.  You can apply it to
your programs, too.

  When we speak of free software, we are referring to freedom, not
price.  Our General Public Licenses are designed to make sure that you
have the freedom to distribute copies of free software (and charge for
them if you wish), that you receive source code or can get it if you
want it, that you can change the software or use pieces of it in new
free programs, and that you know you can do these things.

  To protect your rights, we need to prevent others from denying you
these rights or asking you to surrender the rights.  Therefore, you have
certain responsibilities if you distribute copies of the software, or if
you modify it: responsibilities to respect the freedom of others.

  For example, if you distribute copies of such a program, whether
gratis or for a fee, you must pass on to the recipients the same
freedoms that you received.  You must make sure that they, too, receive
or can get the source code.  And you must show them these terms so they
know their rights.

  Developers that use the GNU GPL protect your rights with two steps:
(1) assert copyright on the software, and (2) offer you this License
giving you legal permission to copy, distribute and/or modify it.

  For the developers' and authors' protection, the GPL clearly explains
that there is no warranty for this free software.  For both users' and
authors' sake, the GPL requires that modified versions be marked as
changed, so that their problems will not be attributed erroneously to
authors of previous versions.

  Some devices are designed to deny users access to install or run
modified versions of the software inside them, although the manufacturer
can do so.  This is fundamentally incompatible with the aim of
protecting users' freedom to change the software.  The systematic
pattern of such abuse occurs in the area of products for individuals to
use, which is precisely where it is most unacceptable.  Therefore, we
have designed this version of the GPL to prohibit the practice for those
products.  If such problems arise substantially in other domains, we
stand ready to extend this provision to those domains in future versions
of the GPL, as needed to protect the freedom of users.

  Finally, every program is threatened constantly by software patents.
States should not allow patents to restrict development and use of
software on general-purpose computers, but in those that do, we wish to
avoid the special danger that patents applied to a free program could
make it effectively proprietary.  To prevent this, the GPL assures that
patents cannot be used to render the program non-free.

  The precise terms and conditions for copying, distribution and
modification follow.

                       TERMS AND CONDITIONS

  0. Definitions.

  "This License" refers to version 3 of the GNU General Public License.

  "Copyright" also means copyright-like laws that apply to other kinds of
works, such as semiconductor masks.

  "The Program" refers to any copyrightable work licensed under this
License.  Each licensee is addressed as "you".  "Licensees" and
"recipients" may be individuals or organizations.

  To "modify" a work means to copy from or adapt all or part of the work
in a fashion requiring copyright permission, other than the making of an
exact copy.  The resulting work is called a "modified version" of the
earlier work or a work "based on" the earlier work.

  A "covered work" means either the unmodified Program or a work based
on the Program.

  To "propagate" a work means to do anything with it that, without
permission, would make you directly or secondarily liable for
infringement under applicable copyright law, except executing it on a
computer or modifying a private copy.  Propagation includes copying,
distribution (with or without modification), making available to the
public, and in some countries other activities as well.

  To "convey" a work means any kind of propagation that enables other
parties to make or receive copies.  Mere interaction with a user through
a computer network, with no transfer of a copy, is not conveying.

  An interactive user interface displays "Appropriate Legal Notices"
to the extent that it includes a convenient and prominently visible
feature that (1) displays an appropriate copyright notice, and (2)
tells the user that there is no warranty for the work (except to the
extent that warranties are provided), that licensees may convey the
work under this License, and how to view a copy of this License.  If
the interface presents a list of user commands or options, such as a
menu, a prominent item in the list meets this criterion.

  1. Source Code.

  The "source code" for a work means the preferred form of the work
for making modifications to it.  "Object code" means any non-source
form of a work.

  A "Standard Interface" means an interface that either is an official
standard defined by a recognized standards body, or, in the case of
interfaces specified for a particular programming language, one that
is widely used among developers working in that language.

  The "System Libraries" of an executable work include anything, other
than the work as a whole, that (a) is included in the normal form of
packaging a Major Component, but which is not part of that Major
Component, and (b) serves only to enable use of the work with that
Major Component, or to implement a Standard Interface for which an
implementation is available to the public in source code form.  A
"Major Component", in this context, means a major essential component
(kernel, window system, and so on) of the specific operating system
(if any) on which the executable work runs, or a compiler used to
produce the work, or an object code interpreter used to run it.

  The "Corresponding Source" for a work in object code form means all
the source code needed to generate, install, and (for an executable
work) run the object code and to modify the work, including scripts to
control those activities.  However, it does not include the work's
System Libraries, or general-purpose tools or generally available free
programs which are used unmodified in performing those activities but
which are not part of the work.  For example, Corresponding Source
includes interface definition files associated with source files for
the work, and the source code for shared libraries and dynamically
linked subprograms that the work is specifically designed to require,
such as by intimate data communication or control flow between those
subprograms and other parts of the work.

  The Corresponding Source need not include anything that users
can regenerate automatically from other parts of the Corresponding
Source.

  The Corresponding Source for a work in source code form is that
same work.

  2. Basic Permissions.

  All rights granted under this License are granted for the term of
copyright on the Program, and are irrevocable provided the stated
conditions are met.  This License explicitly affirms your unlimited
permission to run the unmodified Program.  The output from running a
covered work is covered by this License only if the output, given its
content, constitutes a covered work.  This License acknowledges your
rights of fair use or other equivalent, as provided by copyright law.

  You may make, run and propagate covered works that you do not
convey, without conditions so long as your license otherwise remains
in force.  You may convey covered works to others for the sole purpose
of having them make modifications exclusively for you, or provide you
with facilities for running those works, provided that you comply with
the terms of this License in conveying all material for which you do
not control copyright.  Those thus making or running the covered works
for you must do so exclusively on your behalf, under your direction
and control, on terms that prohibit them from making any copies of
your copyrighted material outside their relationship with you.

  Conveying under any other circumstances is permitted solely under
the conditions stated below.  Sublicensing is not allowed; section 10
makes it unnecessary.

  3. Protecting Users' Legal Rights From Anti-Circumvention Law.

  No covered work shall be deemed part of an effective technological
measure under any applicable law fulfilling obligations under article
11 of the WIPO copyright treaty adopted on 20 December 1996, or
similar laws prohibiting or restricting circumvention of such
measures.

  When you convey a covered work, you waive any legal power to forbid
circumvention of technological measures to the extent such circumvention
is effected by exercising rights under this License with respect to
the covered work, and you disclaim any intention to limit operation or
modification of the work as a means of enforcing, against the work's
users, your or third parties' legal rights to forbid circumvention of
technological measures.

  4. Conveying Verbatim Copies.

  You may convey verbatim copies of the Program's source code as you
receive it, in any medium, provided that you conspicuously and
appropriately publish on each copy an appropriate copyright notice;
keep intact all notices stating that this License and any
non-permissive terms added in accord with section 7 apply to the code;
keep intact all notices of the absence of any warranty; and give all
recipients a copy of this License along with the Program.

  You may charge any price or no price for each copy that you convey,
and you may offer support or warranty protection for a fee.

  5. Conveying Modified Source Versions.

  You may convey a work based on the Program, or the modifications to
produce it from the Program, in the form of source code under the
terms of section 4, provided that you also meet all of these conditions:

    a) The work must carry prominent notices stating that you modified
    it, and giving a relevant date.

    b) The work must carry prominent notices stating that it is
    released under this License and any conditions added under section
    7.  This requirement modifies the requirement in section 4 to
    "keep intact all notices".

    c) You must license the entire work, as a whole, under this
    License to anyone who comes into possession of a copy.  This
    License will therefore apply, along with any applicable section 7
    additional terms, to the whole of the work, and all its parts,
    regardless of how they are packaged.  This License gives no
    permission to license the work in any other way, but it does not
    invalidate such permission if you have separately received it.

    d) If the work has interactive user interfaces, each must display
    Appropriate Legal Notices; however, if the Program has interactive
    interfaces that do not display Appropriate Legal Notices, your
    work need not make them do so.

  A compilation of a covered work with other separate and independent
works, which are not by their nature extensions of the covered work,
and which are not combined with it such as to form a larger program,
in or on a volume of a storage or distribution medium, is called an
"aggregate" if the compilation and its resulting copyright are not
used to limit the access or legal rights of the compilation's users
beyond what the individual works permit.  Inclusion of a covered work
in an aggregate does not cause this License to apply to the other
parts of the aggregate.

  6. Conveying Non-Source Forms.

  You may convey a covered work in object code form under the terms
of sections 4 and 5, provided that you also convey the
machine-readable Corresponding Source under the terms of this License,
in one of these ways:

    a) Convey the object code in, or embodied in, a physical product
    (including a physical distribution medium), accompanied by the
    Corresponding Source fixed on a durable physical medium
    customarily used for software interchange.

    b) Convey the object code in, or embodied in, a physical product
    (including a physical distribution medium), accompanied by a
    written offer, valid for at least three years and valid for as
    long as you offer spare parts or customer support for that product
    model, to give anyone who possesses the object code either (1) a
    copy of the Corresponding Source for all the software in the
    product that is covered by this License, on a durable physical
    medium customarily used for software interchange, for a price no
    more than your reasonable cost of physically performing this
    conveying of source, or (2) access to copy the
    Corresponding Source from a network server at no charge.

    c) Convey individual copies of the object code with a copy of the
    written offer to provide the Corresponding Source.  This
    alternative is allowed only occasionally and noncommercially, and
    only if you received the object code with such an offer, in accord
    with subsection 6b.

    d) Convey the object code by offering access from a designated
    place (gratis or for a charge), and offer equivalent access to the
    Corresponding Source in the same way through the same place at no
    further charge.  You need not require recipients to copy the
    Corresponding Source along with the object code.  If the place to
    copy the object code is a network server, the Corresponding Source
    may be on a different server (operated by you or a third party)
    that supports equivalent copying facilities, provided you maintain
    clear directions next to the object code saying where to find the
    Corresponding Source.  Regardless of what server hosts the
    Corresponding Source, you remain obligated to ensure that it is
    available for as long as needed to satisfy these requirements.

    e) Convey the object code using peer-to-peer transmission, provided
    you inform other peers where the object code and Corresponding
    Source of the work are being offered to the general public at no
    charge under subsection 6d.

  A separable portion of the object code, whose source code is excluded
from the Corresponding Source as a System Library, need not be
included in conveying the object code work.

  A "User Product" is either (1) a "consumer product", which means any
tangible personal property which is normally used for personal, family,
or household purposes, or (2) anything designed or sold for incorporation
into a dwelling.  In determining whether a product is a consumer product,
doubtful cases shall be resolved in favor of coverage.  For a particular
product received by a particular user, "normally used" refers to a
typical or common use of that class of product, regardless of the status
of the particular user or of the way in which the particular user
actually uses, or expects or is expected to use, the product.  A product
is a consumer product regardless of whether the product has substantial
commercial, industrial or non-consumer uses, unless such uses represent
the only significant mode of use of the product.

  "Installation Information" for a User Product means any methods,
procedures, authorization keys, or other information required to install
and execute modified versions of a covered work in that User Product from
a modified version of its Corresponding Source.  The information must
suffice to ensure that the continued functioning of the modified object
code is in no case prevented or interfered with solely because
modification has been made.

  If you convey an object code work under this section in, or with, or
specifically for use in, a User Product, and the conveying occurs as
part of a transaction in which the right of possession and use of the
User Product is transferred to the recipient in perpetuity or for a
fixed term (regardless of how the transaction is characterized), the
Corresponding Source conveyed under this section must be accompanied
by the Installation Information.  But this requirement does not apply
if neither you nor any third party retains the ability to install
modified object code on the User Product (for example, the work has
been installed in ROM).

  The requirement to provide Installation Information does not include a
requirement to continue to provide support service, warranty, or updates
for a work that has been modified or installed by the recipient, or for
the User Product in which it has been modified or installed.  Access to a
network may be denied when the modification itself materially and
adversely affects the operation of the network or violates the rules and
protocols for communication across the network.

  Corresponding Source conveyed, and Installation Information provided,
in accord with this section must be in a format that is publicly
documented (and with an implementation available to the public in
source code form), and must require no special password or key for
unpacking, reading or copying.

  7. Additional Terms.

  "Additional permissions" are terms that supplement the terms of this
License by making exceptions from one or more of its conditions.
Additional permissions that are applicable to the entire Program shall
be treated as though they were included in this License, to the extent
that they are valid under applicable law.  If additional permissions
apply only to part of the Program, that part may be used separately
under those permissions, but the entire Program remains governed by
this License without regard to the additional permissions.

  When you convey a copy of a covered work, you may at your option
remove any additional permissions from that copy, or from any part of
it.  (Additional permissions may be written to require their own
removal in certain cases when you modify the work.)  You may place
additional permissions on material, added by you to a covered work,
for which you have or can give appropriate copyright permission.

  Notwithstanding any other provision of this License, for material you
add to a covered work, you may (if authorized by the copyright holders of
that material) supplement the terms of this License with terms:

    a) Disclaiming warranty or limiting liability differently from the
    terms of sections 15 and 16 of this License; or

    b) Requiring preservation of specified reasonable legal notices or
    author attributions in that material or in the Appropriate Legal
    Notices displayed by works containing it; or

    c) Prohibiting misrepresentation of the origin of that material, or
    requiring that modified versions of such material be marked in
    reasonable ways as different from the original version; or

    d) Limiting the use for publicity purposes of names of licensors or
    authors of the material; or

    e) Declining to grant rights under trademark law for use of some
    trade names, trademarks, or service marks; or

    f) Requiring indemnification of licensors and authors of that
    material by anyone who conveys the material (or modified versions of
    it) with contractual assumptions of liability to the recipient, for
    any liability that these contractual assumptions directly impose on
    those licensors and authors.

  All other non-permissive additional terms are considered "further
restrictions" within the meaning of section 10.  If the Program as you
received it, or any part of it, contains a notice stating that it is
governed by this License along with a term that is a further
restriction, you may remove that term.  If a license document contains
a further restriction but permits relicensing or conveying under this
License, you may add to a covered work material governed by the terms
of that license document, provided that the further restriction does
not survive such relicensing or conveying.

  If you add terms to a covered work in accord with this section, you
must place, in the relevant source files, a statement of the
additional terms that apply to those files, or a notice indicating
where to find the applicable terms.

  Additional terms, permissive or non-permissive, may be stated in the
form of a separately written license, or stated as exceptions;
the above requirements apply either way.

  8. Termination.

  You may not propagate or modify a covered work except as expressly
provided under this License.  Any attempt otherwise to propagate or
modify it is void, and will automatically terminate your rights under
this License (including any patent licenses granted under the third
paragraph of section 11).

  However, if you cease all violation of this License, then your
license from a particular copyright holder is reinstated (a)
provisionally, unless and until the copyright holder explicitly and
finally terminates your license, and (b) permanently, if the copyright
holder fails to notify you of the violation by some reasonable means
prior to 60 days after the cessation.

  Moreover, your license from a particular copyright holder is
reinstated permanently if the copyright holder notifies you of the
violation by some reasonable means, this is the first time you have
received notice of violation of this License (for any work) from that
copyright holder, and you cure the violation prior to 30 days after
your receipt of the notice.

  Termination of your rights under this section does not terminate the
licenses of parties who have received copies or rights from you under
this License.  If your rights have been terminated and not permanently
reinstated, you do not qualify to receive new licenses for the same
material under section 10.

  9. Acceptance Not Required for Having Copies.

  You are not required to accept this License in order to receive or
run a copy of the Program.  Ancillary propagation of a covered work
occurring solely as a consequence of using peer-to-peer transmission
to receive a copy likewise does not require acceptance.  However,
nothing other than this License grants you permission to propagate or
modify any covered work.  These actions infringe copyright if you do
not accept this License.  Therefore, by modifying or propagating a
covered work, you indicate your acceptance of this License to do so.

  10. Automatic Licensing of Downstream Recipients.

  Each time you convey a covered work, the recipient automatically
receives a license from the original licensors, to run, modify and
propagate that work, subject to this License.  You are not responsible
for enforcing compliance by third parties with this License.

  An "entity transaction" is a transaction transferring control of an
organization, or substantially all assets of one, or subdividing an
organization, or merging organizations.  If propagation of a covered
work results from an entity transaction, each party to that
transaction who receives a copy of the work also receives whatever
licenses to the work the party's predecessor in interest had or could
give under the previous paragraph, plus a right to possession of the
Corresponding Source of the work from the predecessor in interest, if
the predecessor has it or can get it with reasonable efforts.

  You may not impose any further restrictions on the exercise of the
rights granted or affirmed under this License.  For example, you may
not impose a license fee, royalty, or other charge for exercise of
rights granted under this License, and you may not initiate litigation
(including a cross-claim or counterclaim in a lawsuit) alleging that
any patent claim is infringed by making, using, selling, offering for
sale, or importing the Program or any portion of it.

  11. Patents.

  A "contributor" is a copyright holder who authorizes use under this
License of the Program or a work on which the Program is based.  The
work thus licensed is called the contributor's "contributor version".

  A contributor's "essential patent claims" are all patent claims
owned or controlled by the contributor, whether already acquired or
hereafter acquired, that would be infringed by some manner, permitted
by this License, of making, using, or selling its contributor version,
but do not include claims that would be infringed only as a
consequence of further modification of the contributor version.  For
purposes of this definition, "control" includes the right to grant
patent sublicenses in a manner consistent with the requirements of
this License.

  Each contributor grants you a non-exclusive, worldwide, royalty-free
patent license under the contributor's essential patent claims, to
make, use, sell, offer for sale, import and otherwise run, modify and
propagate the contents of its contributor version.

  In the following three paragraphs, a "patent license" is any express
agreement or commitment, however denominated, not to enforce a patent
(such as an express permission to practice a patent or covenant not to
sue for patent infringement).  To "grant" such a patent license to a
party means to make such an agreement or commitment not to enforce a
patent against the party.

  If you convey a covered work, knowingly relying on a patent license,
and the Corresponding Source of the work is not available for anyone
to copy, free of charge and under the terms of this License, through a
publicly available network server or other readily accessible means,
then you must either (1) cause the Corresponding Source to be so
available, or (2) arrange to deprive yourself of the benefit of the
patent license for this particular work, or (3) arrange, in a manner
consistent with the requirements of this License, to extend the patent
license to downstream recipients.  "Knowingly relying" means you have
actual knowledge that, but for the patent license, your conveying the
covered work in a country, or your recipient's use of the covered work
in a country, would infringe one or more identifiable patents in that
country that you have reason to believe are valid.

  If, pursuant to or in connection with a single transaction or
arrangement, you convey, or propagate by procuring conveyance of, a
covered work, and grant a patent license to some of the parties
receiving the covered work authorizing them to use, propagate, modify
or convey a specific copy of the covered work, then the patent license
you grant is automatically extended to all recipients of the covered
work and works based on it.

  A patent license is "discriminatory" if it does not include within
the scope of its coverage, prohibits the exercise of, or is
conditioned on the non-exercise of one or more of the rights that are
specifically granted under this License.  You may not convey a covered
work if you are a party to an arrangement with a third party that is
in the business of distributing software, under which you make payment
to the third party based on the extent of your activity of conveying
the work, and under which the third party grants, to any of the
parties who would receive the covered work from you, a discriminatory
patent license (a) in connection with copies of the covered work
conveyed by you (or copies made from those copies), or (b) primarily
for and in connection with specific products or compilations that
contain the covered work, unless you entered into that arrangement,
or that patent license was granted, prior to 28 March 2007.

  Nothing in this License shall be construed as excluding or limiting
any implied license or other defenses to infringement that may
otherwise be available to you under applicable patent law.

  12. No Surrender of Others' Freedom.

  If conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not
excuse you from the conditions of this License.  If you cannot convey a
covered work so as to satisfy simultaneously your obligations under this
License and any other pertinent obligations, then as a consequence you may
not convey it at all.  For example, if you agree to terms that obligate you
to collect a royalty for further conveying from those to whom you convey
the Program, the only way you could satisfy both those terms and this
License would be to refrain entirely from conveying the Program.

  13. Use with the GNU Affero General Public License.

  Notwithstanding any other provision of this License, you have
permission to link or combine any covered work with a work licensed
under version 3 of the GNU Affero General Public License into a single
combined work, and to convey the resulting work.  The terms of this
License will continue to apply to the part which is the covered work,
but the special requirements of the GNU Affero General Public License,
section 13, concerning interaction through a network will apply to the
combination as such.

  14. Revised Versions of this License.

  The Free Software Foundation may publish revised and/or new versions of
the GNU General Public License from time to time.  Such new versions will
be similar in spirit to the present version, but may differ in detail to
address new problems or concerns.

  Each version is given a distinguishing version number.  If the
Program specifies that a certain numbered version of the GNU General
Public License "or any later version" applies to it, you have the
option of following the terms and conditions either of that numbered
version or of any later version published by the Free Software
Foundation.  If the Program does not specify a version number of the
GNU General Public License, you may choose any version ever published
by the Free Software Foundation.

  If the Program specifies that a proxy can decide which future
versions of the GNU General Public License can be used, that proxy's
public statement of acceptance of a version permanently authorizes you
to choose that version for the Program.

  Later license versions may give you additional or different
permissions.  However, no additional obligations are imposed on any
author or copyright holder as a result of your choosing to follow a
later version.

  15. Disclaimer of Warranty.

  THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
APPLICABLE LAW.  EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
IS WITH YOU.  SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

  16. Limitation of Liability.

  IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.

  17. Interpretation of Sections 15 and 16.

  If the disclaimer of warranty and limitation of liability provided
above cannot be given local legal effect according to their terms,
reviewing courts shall apply local law that most closely approximates
an absolute waiver of all civil liability in connection with the
Program, unless a warranty or assumption of liability accompanies a
copy of the Program in return for a fee.

                     END OF TERMS AND CONDITIONS

            How to Apply These Terms to Your New Programs

  If you develop a new program, and you want it to be of the greatest
possible use to the public, the best way to achieve this is to make it
free software which everyone can redistribute and change under these terms.

  To do so, attach the following notices to the program.  It is safest
to attach them to the start of each source file to most effectively
state the exclusion of warranty; and each file should have at least
the "copyright" line and a pointer to where the full notice is found.

    <one line to give the program's name and a brief idea of what it does.>
    Copyright (C) <year>  <name of author>

    This program is free software: you can redistribute it and/or modify
    it under the terms of the GNU General Public License as published by
    the Free Software Foundation, either version 3 of the License, or
    (at your option) any later version.

    This program is distributed in the hope that it will be useful,
    but WITHOUT ANY WARRANTY; without even the implied warranty of
    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
    GNU General Public License for more details.

    You should have received a copy of the GNU General Public License
    along with this program.  If not, see <https://www.gnu.org/licenses/>.

Also add information on how to contact you by electronic and paper mail.

  If the program does terminal interaction, make it output a short
notice like this when it starts in an interactive mode:

    <program>  Copyright (C) <year>  <name of author>
    This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
    This is free software, and you are welcome to redistribute it
    under certain conditions; type `show c' for details.

The hypothetical commands `show w' and `show c' should show the appropriate
parts of the General Public License.  Of course, your program's commands
might be different; for a GUI interface, you would use an "about box".

  You should also get your employer (if you work as a programmer) or school,
if any, to sign a "copyright disclaimer" for the program, if necessary.
For more information on this, and how to apply and follow the GNU GPL, see
<https://www.gnu.org/licenses/>.

  The GNU General Public License does not permit incorporating your program
into proprietary programs.  If your program is a subroutine library, you
may consider it more useful to permit linking proprietary applications with
the library.  If this is what you want to do, use the GNU Lesser General
Public License instead of this License.  But first, please read
<https://www.gnu.org/licenses/why-not-lgpl.html>.


================================================
FILE: README.md
================================================
# Genealogy Database of Fuzzers

This repository is our attempt to maintain an up-to-date genealogy database of
fuzzers and relevant papers. It is the continuation of an initial effort made by
Manès et al. in ["The Art, Science, and Engineering of Fuzzing: A
Survey"](https://ieeexplore.ieee.org/document/8863940), published in 2019 in
*IEEE Transactions on Software Engineering*. You can visit
https://fuzzing-survey.org to see an interactive site backed by this database.

## What is this survey about?

Our survey is about fuzzers and the relevant literature. Since "fuzzing" is a
largely overloaded term, a primary goal of our survey is to precisely define
what fuzzing is and to characterize various fuzzers. To this end, we split the
process of fuzzing into several steps and use them to systematically categorize
fuzzers based on their features. This repository maintains one of the major
outcomes of this effort, namely a genealogy graph of fuzzers.

## How is this genealogy graph rendered?

We use a [force-directed graph layout
algorithm](https://en.wikipedia.org/wiki/Force-directed_graph_drawing) with
several tweaks. In our current layout, nodes tend to be sorted vertically based
on their year of publication and inter-linked nodes tend to be spatially
clustered together.

## How can I contribute?

We have seeded this repository with the data we collected for our 2019 survey.
Due to the rapid development in fuzzing, we realize our database will quickly
become outdated due to missing papers and tools. It is our hope that, by hosting
this repository in public, you can contribute to this database and help keep it
up-to-date. Please proceed to the [contribution guideline](CONTRIBUTING.md) if
you wish to contribute.

## Who are the maintainers of this database?

This database is currently maintained by:
- [Cyber Security Research Center (CSRC) at KAIST](https://csrc.kaist.ac.kr/)
- [SoftSec Lab. at KAIST](https://softsec.kaist.ac.kr/)

## How do I cite this work?

If you plan to refer to this work, please consider citing our 2019 survey using
the following BibTeX entry. Thank you!

(We are hosting a [pre-print of our
survey](https://softsec.kaist.ac.kr/~sangkilc/papers/manes-tse19.pdf) until the
final version is published at IEEE.)

```bibtex
@ARTICLE{manes:tse:2021,
  author = {Valentin J. M. Man{\`{e}}s and HyungSeok Han and Choongwoo Han and Sang Kil Cha and Manuel Egele and Edward J. Schwartz and Maverick Woo},
  title = {The Art, Science, and Engineering of Fuzzing: A Survey},
  journal = {IEEE Transactions on Software Engineering},
  volume = {47},
  number = {11},
  pages = {2312--2331},
  year = 2021
}
```


================================================
FILE: css/asefuzz.css
================================================
/* */

body {
  display: flex;
  flex-direction: column;
  min-height: 100vh;
  height: 100%;
  overflow: hidden;
}

.main {
  flex: 1;
  display: flex;
  margin-left: 0;
  margin-right: 0;
  min-height: 0;
}

.searchform {
  overflow: auto;
  flex: 1;
}

.searchform__result {
  position: absolute;
  width: 50%;
  z-index: 1;
}

.searchform__result > li {
  overflow: hidden;
  border: none;
  cursor: pointer;
}

.searchform__result > li.active {
  color: var(--dark);
  background-color: var(--yellow);
}

.searchform__result > li:hover {
  background-color: var(--yellow);
}

.canvas {
  flex: 1;
  min-height: 0;
  overflow: hidden;
}

.separator {
  display: none;
}

.infobox {
  position: relative;
  width: 100%;
  height: 100%;
  overflow-x: hidden;
  transition: 0.5s;
  padding: 0px;
  display: none;
}

.infobox__close {
  padding-top: 10px;
  text-align: center;
}

@media (min-width: 768px) {
  .separator {
    display: initial;
    flex-basis: 4px;
    background-color: darkgrey;
    cursor: col-resize;
  }

  .infobox {
    display: initial;
    height: 100%;
    flex-basis: 400px;
    overflow-x: hidden;
    transition: 0.5s;
    padding: 0px;
  }

  .infobox__close {
    display: none;
  }
}

.infobox__header {
  background-color: lightgrey;
  padding: 5px;
}

.infobox__icon,
.infobox__icon:active,
.infobox__icon:hover,
.infobox__icon:visited {
  color: var(--secondary);
}

.footer {
  background-color: var(--light);
}

.node {
  cursor: pointer;
}

.node-blackbox {
  fill: #111111;
  fill-opacity: 0.9;
  stroke: var(--dark);
  stroke-width: 3px;
}

.node-whitebox {
  fill: #fefefe;
  stroke: var(--dark);
  stroke-width: 1px;
}

.node-greybox {
  fill: #999999;
  stroke: var(--gray);
  stroke-width: 3px;
}

.node-found {
  fill: var(--red) !important;
}

.node-selected {
  fill: var(--green) !important;
  stroke: var(--green) !important;
}

.nodetext {
  font: 9px sans-serif;
  font-weight: bold;
  text-anchor: middle;
  cursor: pointer;
}

.nodetext-blackbox {
  fill: var(--white);
}

.link {
  fill: none;
  stroke: var(--gray);
  stroke-width: 2px;
}

.stats-body__filter {
  display: block;
  width: 100%;
  padding: 7px 10px;
  border: 2px solid var(--gray);
  border-radius: 15px;
  outline: 0;
}

.modal.fade {
  overflow: hidden;
}

.modal-content .modal-body {
  height: 80vh;
  overflow-y: scroll;
}

.accordion .card {
  border: 0px;
}

.card .card-header {
  padding: 5px;
  border: 0px;
  cursor: pointer;
}

.modal-body .accordion {
  height: 200px;
  overflow-y: scroll;
}

.space-top {
  margin-top: 15px;
}


================================================
FILE: data/fuzzers.json
================================================
[
  {
    "name": "ACTOR",
    "year": "2023",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "author": [
      "Marius Fleischer",
      "Dipanjan Das",
      "Priyanka Bose",
      "Weiheng Bai",
      "Kangjie Lu",
      "Mathias Payer",
      "Christopher Kruegel",
      "Giovanni Vigna"
    ],
    "toolurl": "https://github.com/ucsb-seclab/actor",
    "title": "ACTOR: Action-Guided Kernel Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "syzkaller"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-fleischer.pdf"
    ]
  },
  {
    "name": "AFL",
    "year": 2014,
    "author": [
      "Michał Zalewski"
    ],
    "toolurl": "http://lcamtuf.coredump.cx/afl/",
    "targets": [
      "File"
    ],
    "miscurl": [
      "http://lcamtuf.coredump.cx/afl/technical_details.txt"
    ],
    "color": "greybox"
  },
  {
    "name": "AFL++",
    "year": 2019,
    "author": [
      "Marc Heuse",
      "Heiko Eißfeldt",
      "Andrea Fioraldi",
      "Dominik Maier"
    ],
    "toolurl": "https://github.com/AFLplusplus/AFLplusplus",
    "miscurl": [
      "https://aflplus.plus/"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFLFast",
      "MOPT"
    ],
    "color": "greybox"
  },
  {
    "name": "AFL-HIER",
    "year": 2021,
    "author": [
      "Jinghan Wang",
      "Chengyu Song",
      "Heng Yin"
    ],
    "title": "Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/bitsecurerlab/aflplusplus-hier",
    "miscurl": [
      "https://www.cs.ucr.edu/~heng/pubs/afl-hier.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL",
      "AFL++"
    ],
    "color": "greybox"
  },
  {
    "name": "AFLChurn",
    "year": 2021,
    "author": [
      "Xiaogang Zhu",
      "Marcel Böhme"
    ],
    "title": "Regression Greybox Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "toolurl": "https://github.com/aflchurn/aflchurn",
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "AFLFast",
    "year": 2016,
    "author": [
      "Marcel Böhme",
      "Van-Thuan Pham",
      "Abhik Roychoudhury"
    ],
    "title": "Coverage-based Greybox Fuzzing as Markov Chain",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://mboehme.github.io/paper/CCS16.pdf",
      "https://mboehme.github.io/paper/TSE18.pdf"
    ],
    "toolurl": "https://github.com/mboehme/aflfast",
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "AFLGo",
    "year": 2017,
    "author": [
      "Marcel Böhme",
      "Van-Thuan Pham",
      "Manh-Dung Nguyen",
      "Abhik Roychoudhury"
    ],
    "title": "Directed Greybox Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://mboehme.github.io/paper/CCS17.pdf"
    ],
    "toolurl": "https://github.com/aflgo/aflgo",
    "targets": [
      "File"
    ],
    "references": [
      "AFL",
      "AFLFast"
    ],
    "color": "greybox"
  },
  {
    "name": "AFLNet",
    "year": 2020,
    "targets": [
      "Network"
    ],
    "color": "greybox",
    "author": [
      "Van-Thuan Pham",
      "Marcel Böhme",
      "Abhik Roychoudhury"
    ],
    "toolurl": "https://github.com/aflnet/aflnet",
    "title": "AFLNet: A Greybox Fuzzer for Network Protocols",
    "booktitle": "Proceedings of the International Conference on Software Testing, Validation and Verification",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://ieeexplore.ieee.org/document/9159093"
    ]
  },
  {
    "name": "AFLRun",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Huanyao Rong",
      "Wei You",
      "XiaoFeng Wang",
      "Tiaohao Mao"
    ],
    "toolurl": "https://github.com/Mem2019/AFLRun",
    "title": "Toward Unbiased Multiple-Target Fuzzing with Path Diversity",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL++",
      "AFLGo"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-rong.pdf"
    ]
  },
  {
    "name": "AFLSmart",
    "year": 2019,
    "author": [
      "Van-Thuan Pham",
      "Marcel Böhme",
      "Andrew E. Santosa",
      "Alexandru Razvan Caciulescu",
      "Abhik Roychoudhury"
    ],
    "title": "Smart Greybox Fuzzing",
    "booktitle": "IEEE Transactions on Software Engineering",
    "toolurl": "https://github.com/aflsmart/aflsmart",
    "miscurl": [
      "https://thuanpv.github.io/publications/TSE19_aflsmart.pdf"
    ],
    "references": [
      "AFL"
    ],
    "targets": [
      "File"
    ],
    "color": "greybox"
  },
  {
    "name": "AIFORE",
    "year": 2023,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Ji Shi",
      "Zhun Wang",
      "Zhiyao Feng",
      "Yang Lan",
      "Shisong Qin",
      "Wei You",
      "Wei Zou",
      "Mathias Payer",
      "Chao Zhang"
    ],
    "title": "AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "VUzzer"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-shi-ji.pdf"
    ]
  },
  {
    "name": "AMPFuzz",
    "year": 2022,
    "targets": [
      "Network"
    ],
    "color": "greybox",
    "author": [
      "Johannes Krupp",
      "Ilya Grishchenko",
      "Christian Rossow"
    ],
    "toolurl": "https://github.com/cispa/ampfuzz",
    "title": "AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "ParmeSan",
      "Angora"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-krupp.pdf"
    ]
  },
  {
    "name": "APE",
    "year": 2019,
    "author": [
      "Tianxiao Gu",
      "Chengnian Sun",
      "Xiaoxing Ma",
      "Chun Cao",
      "Chang Xu",
      "Yuan Yao",
      "Qirun Zhang",
      "Jian Lu",
      "Zhendong Su"
    ],
    "title": "Practical GUI Testing of Android Applications via Model Abstraction and Refinement",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/tianxiaogu/ape",
    "miscurl": [
      "http://gutianxiao.com/static/ape-icse-2019.pdf"
    ],
    "targets": [
      "UI"
    ],
    "color": "blackbox"
  },
  {
    "name": "Aafer et al.",
    "year": 2021,
    "author": [
      "Yousra Aafer",
      "Wei You",
      "Yi Sun",
      "Yu Shi",
      "Xiangyu Zhang",
      "Heng Yin"
    ],
    "title": "Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec21fall-aafer.pdf"
    ],
    "targets": [
      "API"
    ],
    "references": [
      "FANS",
      "IoTFuzzer"
    ],
    "color": "blackbox"
  },
  {
    "name": "Angora",
    "year": 2018,
    "author": [
      "Peng Chen",
      "Hao Chen"
    ],
    "title": "Angora: Efficient Fuzzing by Principled Search",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "toolurl": "https://github.com/AngoraFuzzer/Angora",
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "Ankou",
    "year": 2020,
    "author": [
      "Valentin J.M. Manès",
      "Soomin Kim",
      "Sang Kil Cha"
    ],
    "title": "Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://softsec.kaist.ac.kr/~sangkilc/papers/manes-icse20.pdf"
    ],
    "targets": [
      "File"
    ],
    "toolurl": "https://github.com/SoftSec-KAIST/ankou",
    "references": [
      "AFL",
      "AFLFast"
    ],
    "color": "greybox"
  },
  {
    "name": "AssetFuzzer",
    "year": 2010,
    "author": [
      "Zhifeng Lai",
      "S.C. Cheung",
      "W.K. Chan"
    ],
    "title": "Detecting Atomic-Set Serializability Violations in Multithreaded Programs through Active Randomized Testing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "Concurrency"
    ],
    "references": [
      "CalFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "AtomFuzzer",
    "year": 2008,
    "author": [
      "Chang-Seo Park",
      "Koushik Sen"
    ],
    "title": "Randomized Active Atomicity Violation Detection in Concurrent Programs",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "toolurl": "https://github.com/ksen007/calfuzzer",
    "targets": [
      "Concurrency"
    ],
    "references": [
      "CalFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "Atropos",
    "year": "2024",
    "targets": [
      "Web"
    ],
    "color": "greybox",
    "author": [
      "Emre Güler",
      "Sergej Schumilo",
      "Moritz Schloegel",
      "Nils Bars",
      "Philipp Görz",
      "Xinyi Xu",
      "Cemal Kaygusuz",
      "Thorsten Holz"
    ],
    "toolurl": "https://github.com/cispa-syssec/atropos-legacy",
    "title": "Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Witcher",
      "AFL++"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-guler.pdf"
    ]
  },
  {
    "name": "Autodafé",
    "year": 2005,
    "author": [
      "Martin Vuagnoux"
    ],
    "title": "Autodafé: an Act of Software Torture",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://infoscience.epfl.ch/record/140525/files/Vuagnoux05.pdf"
    ],
    "references": [
      "SPIKE"
    ],
    "targets": [],
    "color": "blackbox"
  },
  {
    "name": "BEACON",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Heqing Huang",
      "Yiyuan Guo",
      "Qingkai Shi",
      "Peisen Yao",
      "Rongxin Wu",
      "Charles Zhang"
    ],
    "toolurl": "https://hub.docker.com/r/yguoaz/beacon",
    "title": "BEACON : Directed Grey-Box Fuzzing with Provable Path Pruning",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "references": [
      "AFLGo"
    ],
    "miscurl": [
      "https://qingkaishi.github.io/public_pdfs/SP22.pdf"
    ],
    "keywords": [
      "Directed fuzzing"
    ]
  },
  {
    "name": "BFF",
    "year": 2010,
    "author": [
      "CERT"
    ],
    "toolurl": "https://resources.sei.cmu.edu/library/asset-view.cfm?assetID=507974",
    "targets": [
      "File"
    ],
    "references": [
      "zzuf"
    ],
    "color": "blackbox"
  },
  {
    "name": "BRF",
    "year": "2024",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "references": [
      "syzkaller"
    ],
    "author": [
      "Hsin-Wei Hung",
      "Ardalan Amiri Sani"
    ],
    "toolurl": "https://github.com/trusslab/brf",
    "title": "{BRF}: Fuzzing the {eBPF} Runtime",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3643778"
    ]
  },
  {
    "name": "BUZZBEE",
    "year": "2024",
    "targets": [
      "DBMS"
    ],
    "color": "greybox",
    "references": [
      "Squirrel"
    ],
    "author": [
      "Yupeng Yang",
      "Yongheng Chen",
      "Rui Zhong",
      "Jizhou Chen",
      "Wenke Lee"
    ],
    "toolurl": "https://github.com/OMH4ck/BuzzBee",
    "title": "BUZZBEE: Towards Generic Database Management System Fuzzing",
    "booktitle": "Proceedings of the 33rd USENIX Security Symposium",
    "journal": "USENIX Security",
    "miscurl": [
      "https://www.usenix.org/conference/usenixsecurity24/presentation/yang-yupeng"
    ],
    "keywords": [
      "dbms",
      "sql",
      "nosql"
    ]
  },
  {
    "name": "BeDivFuzz",
    "year": 2022,
    "targets": [
      "Java"
    ],
    "color": "greybox",
    "author": [
      "Hoang Lam Nguyen",
      "Lars Grunske"
    ],
    "toolurl": "https://github.com/hub-se/BeDivFuzz",
    "title": "BeDivFuzz: Integrating Behavioral Diversity into Generator-based Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "JQF"
    ],
    "miscurl": [
      "https://arxiv.org/pdf/2202.13114.pdf"
    ]
  },
  {
    "name": "BigFuzz",
    "year": 2020,
    "author": [
      "Qian Zhang",
      "Jiyuan Wang",
      "Muhammad Ali Gulzar",
      "Rohan Padhye",
      "Miryung Kim"
    ],
    "title": "BigFuzz: Efficient Fuzz Testing for Data Analytics Using Framework Abstraction",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/qianzhanghk/BigFuzz",
    "miscurl": [
      "https://rohan.padhye.org/files/bigfuzz-ase20.pdf"
    ],
    "targets": [
      "DISC (Data-Intensive Scalable Computing) Systems"
    ],
    "references": [
      "JQF"
    ],
    "color": "greybox"
  },
  {
    "name": "BitFuzz",
    "year": 2010,
    "author": [
      "Juan Caballero",
      "Pongsin Poosankam",
      "Stephen McCamant",
      "Domagoj Babic",
      "Dawn Song"
    ],
    "title": "Input Generation via Decomposition and Re-stitching: Finding Bugs in Malware",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "http://bitblaze.cs.berkeley.edu/papers/restitching.pdf"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "Bleem",
    "year": 2023,
    "targets": [
      "Network"
    ],
    "color": "blackbox",
    "author": [
      "Zhengxiong Luo",
      "Junze Yu",
      "Feilong Zuo",
      "Jianzhong Liu",
      "Yu Jiang",
      "Ting Chen",
      "Abhik Roychoudhury",
      "Jiaguang Sun"
    ],
    "title": "Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Peach"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-luo-zhengxiong.pdf"
    ]
  },
  {
    "name": "BlendFuzz",
    "year": 2012,
    "author": [
      "Dingning Yang",
      "Yuqing Zhang",
      "Qixu Liu"
    ],
    "title": "BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical Inputs",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "miscurl": [
      "https://ieeexplore.ieee.org/abstract/document/6296093"
    ],
    "references": [
      "LangFuzz"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "Bonsai-Fuzzing",
    "year": 2021,
    "author": [
      "Vasudev Vikram",
      "Rohan Padhye",
      "Koushik Sen"
    ],
    "title": "Growing A Test Corpus with Bonsai Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "toolurl": "https://github.com/vasumv/bonsai-fuzzing",
    "miscurl": [
      "https://thuanpv.github.io/publications/TSE19_aflsmart.pdf"
    ],
    "references": [
      "Nautilus",
      "Superion"
    ],
    "targets": [
      "File"
    ],
    "color": "greybox"
  },
  {
    "name": "BrakTooth",
    "year": 2022,
    "targets": [
      "Network"
    ],
    "color": "greybox",
    "author": [
      "Matheus E. Garbelini",
      "Vaibhav Bedi",
      "Sudipta Chattopadhyay",
      "Suemi Sun",
      "Ernest Kurniawan"
    ],
    "toolurl": "https://github.com/Matheus-Garbelini/braktooth_esp32_bluetooth_classic_attacks",
    "title": "BrakTooth: Causing Havoc on Bluetooth Link Manater via Directed Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Frankenstein"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-garbelini.pdf"
    ]
  },
  {
    "name": "Brennan et al.",
    "year": 2020,
    "author": [
      "Tegan Brennan",
      "Seemanta Saha",
      "Tevfik Bultan"
    ],
    "title": "JVM Fuzzing for JIT-Induced Side-Channel Detection",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "Side-channel"
    ],
    "references": [
      "Kelinci",
      "DifFuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "BuzzFuzz",
    "year": 2009,
    "author": [
      "Vijay Ganesh",
      "Tim Leek",
      "Martin Rinard"
    ],
    "title": "Taint-based Directed Whitebox Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "File"
    ],
    "references": [
      "SAGE"
    ],
    "color": "whitebox"
  },
  {
    "name": "CAB-Fuzz",
    "year": 2017,
    "author": [
      "Su Yong Kim",
      "Sangho Lee",
      "Insu Yun",
      "Wen Xu",
      "Byoungyoung Lee",
      "Youngtae Yun",
      "Taesoo Kim"
    ],
    "title": "CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems",
    "booktitle": "Proceedings of the USENIX Annual Technical Conference",
    "miscurl": [
      "https://www.usenix.org/system/files/conference/atc17/atc17-kim.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "references": [
      "Trinity"
    ],
    "color": "whitebox"
  },
  {
    "name": "CAFL",
    "year": 2021,
    "author": [
      "Gwangmu Lee",
      "Woochel Shim",
      "Byoungyoung Lee"
    ],
    "title": "Constraint-guided Directed Greybox Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec21fall-lee-gwangmu.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFLGo"
    ],
    "color": "greybox"
  },
  {
    "name": "CDFUZZ",
    "year": "2025",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Mingyuan Wu",
      "Jiahong Xiang",
      "Kunqiu Chen",
      "Peng Di",
      "Shin Hwei Tan",
      "Heming Cui",
      "Yuqun Zhang"
    ],
    "toolurl": "https://github.com/GhabiX/CDFuzz",
    "title": "Tumbling Down the Rabbit Hole: How do Assisting Exploration Strategies Facilitate Grey-box Fuzzing? ",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://doi.org/10.48550/arXiv.2409.14541"
    ],
    "keywords": [
      "dictionary strategy",
      "exploration strategies "
    ]
  },
  {
    "name": "CHIPSEC",
    "year": 2015,
    "author": [
      "Mikhail Gorobets",
      "Oleksandr Bazhaniuk",
      "Alex Matrosov",
      "Andrew Furtak",
      "Yuriy Bulygin"
    ],
    "title": "Attacking Hypervisors via Firmware and Hardware",
    "booktitle": "Proceedings of the Black Hat USA",
    "toolurl": "https://github.com/chipsec/chipsec",
    "references": [
      "Sulley"
    ],
    "targets": [
      "Firmware",
      "Hypervisor"
    ],
    "color": "blackbox"
  },
  {
    "name": "CLSmith",
    "year": 2015,
    "author": [
      "Christopher Lidbury",
      "Andrei Lascu",
      "Nathan Chong",
      "Alastair F. Donaldson"
    ],
    "title": "Many-Core Compiler Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "toolurl": "http://multicore.doc.ic.ac.uk/projects/clsmith/",
    "miscurl": [
      "http://multicore.doc.ic.ac.uk/tools/CLsmith/paper.pdf"
    ],
    "references": [
      "CSmith"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "COMFORT",
    "year": 2021,
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "author": [
      "Guixin Ye",
      "Zhanyong Tang",
      "Shin Hwei Tan",
      "Songfang Huang",
      "Dingyi Fang",
      "Xiaoyang Sun",
      "Lizhong Bian",
      "Haibo Wang",
      "Zheng Wang"
    ],
    "toolurl": "https://github.com/NWU-NISL-Fuzzing/COMFORT",
    "title": "Automated Conformance Testing for JavaScript Engines via Deep Compiler Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "miscurl": [
      "https://arxiv.org/pdf/2104.07460.pdf"
    ],
    "references": [
      "Montage"
    ],
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "CONFETTI",
    "year": 2022,
    "targets": [
      "Java"
    ],
    "color": "whitebox",
    "author": [
      "James Kukucka",
      "Luís Pina",
      "Paul Ammann",
      "Jonathan Bell"
    ],
    "toolurl": "https://github.com/neu-se/CONFETTI",
    "title": "CONFETTI: Amplifying Concolic Guidance for Fuzzers",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "JQF"
    ],
    "miscurl": [
      "https://www.jonbell.net/preprint/confetti.pdf"
    ]
  },
  {
    "name": "CONZZER",
    "year": 2022,
    "targets": [
      "Concurrency"
    ],
    "color": "greybox",
    "author": [
      "Zu-Ming Jiang",
      "Jia-Ju Bai",
      "Kangjie Lu",
      "Shi-Min Hu"
    ],
    "toolurl": "https://oslab.cs.tsinghua.edu.cn/CONZZER/",
    "title": "Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www-users.cse.umn.edu/~kjlu/papers/conzzer.pdf"
    ],
    "references": [
      "Krace"
    ]
  },
  {
    "name": "COOPER",
    "year": 2022,
    "author": [
      "Peng Xu",
      "Yanhao Wang",
      "Hong Hu",
      "Purui Su"
    ],
    "title": "COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://huhong789.github.io/papers/xu:cooper.pdf"
    ],
    "toolurl": "https://github.com/TCA-ISCAS/Cooper",
    "targets": [
      "JavaScript",
      "VBA"
    ],
    "references": [
      "Favocado"
    ],
    "color": "greybox"
  },
  {
    "name": "CSmith",
    "year": 2011,
    "author": [
      "Xuejun Yang",
      "Yang Chen",
      "Eric Eide",
      "John Regehr"
    ],
    "title": "Finding and Understanding Bugs in C Compilers",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "toolurl": "https://github.com/csmith-project/csmith/",
    "miscurl": [
      "http://www.cs.utah.edu/~regehr/papers/pldi11-preprint.pdf"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "CalFuzzer",
    "year": 2007,
    "author": [
      "Koushik Sen"
    ],
    "title": "Effective Random Testing of Concurrent Programs",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/ksen007/calfuzzer",
    "targets": [
      "Concurrency"
    ],
    "color": "greybox"
  },
  {
    "name": "CarpetFuzz",
    "year": 2023,
    "targets": [
      "Argument",
      "File"
    ],
    "color": "greybox",
    "author": [
      "Dawei Wang",
      "Ying Li",
      "Zhiyu Zhang",
      "Kai Chen"
    ],
    "toolurl": "https://github.com/waugustus/CarpetFuzz",
    "title": "CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-wang-dawei.pdf"
    ]
  },
  {
    "name": "Cascade",
    "year": "2024",
    "targets": [
      "CPU"
    ],
    "color": "greybox",
    "author": [
      "Flavien Solt",
      "Katharina Ceesay-Seitz",
      "Kaveh Razavi"
    ],
    "toolurl": "https://comsec.ethz.ch/cascade",
    "title": "Cascade: CPU Fuzzing via Intricate Program Generation",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "DifuzzRTL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-solt.pdf"
    ],
    "keywords": [
      "cpu fuzzing",
      "riscv"
    ]
  },
  {
    "name": "Cerebro",
    "year": 2019,
    "author": [
      "Yuekang Li",
      "Yinxing Xue",
      "Hongxu Chen",
      "Xuheng Wu",
      "Cen Zhang",
      "Xiaofei Xie",
      "Haijun Wang",
      "Yang Liu"
    ],
    "title": "Cerebro: Context-Aware Adaptive Fuzzing for Effective Vulnerability Detection",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://hongxuchen.github.io/pdf/cerebro.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFLFast",
      "CollAFL"
    ],
    "color": "greybox"
  },
  {
    "name": "ChatAFL",
    "year": "2024",
    "targets": [
      "Network"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Ruijie Meng",
      "Martin Mirchev",
      "Marcel Bohme",
      "Abhik Roychoudhury"
    ],
    "toolurl": "https://github.com/ChatAFLndss/ChatAFL",
    "title": "Large Language Model guided Protocol Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2024-556-paper.pdf"
    ],
    "keywords": [
      "LLM"
    ]
  },
  {
    "name": "Chen et al",
    "year": 2019,
    "author": [
      "Yuqi Chen",
      "Christopher M. Poskitt",
      "Jun Sun",
      "Sridhar Adepu",
      "Fan Zhang"
    ],
    "title": "Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://cposkitt.github.io/files/publications/Chen-Poskitt-et_al.ASE.2019.pdf"
    ],
    "targets": [
      "Network"
    ],
    "color": "greybox"
  },
  {
    "name": "Chopper",
    "year": 2016,
    "author": [
      "David Trabish",
      "Andrea Mattavelli",
      "Noam Rinetzky",
      "Cristian Cadar"
    ],
    "title": "Chopped Symbolic Execution",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "toolurl": "https://github.com/jordr/chopper",
    "miscurl": [
      "https://www.cs.tau.ac.il/~maon/pubs/2018-icse.pdf"
    ],
    "targets": [
      "Argument",
      "File"
    ],
    "references": [
      "KLEE"
    ],
    "color": "whitebox"
  },
  {
    "name": "Choronzon",
    "year": 2015,
    "author": [
      "Zisis Sialveras",
      "Nikolaos Naziridis"
    ],
    "title": "Introducing Choronzon: An approach at knowledge-based evolutionary fuzzing",
    "booktitle": "Proceedings of the ZeroNights",
    "references": [
      "Sidewinder"
    ],
    "targets": [
      "File"
    ],
    "miscurl": [
      "https://census-labs.com/media/choronzon-zeronights-2015.pdf"
    ],
    "color": "greybox"
  },
  {
    "name": "Chronos",
    "year": "2024",
    "targets": [
      "Distributed System"
    ],
    "color": "greybox",
    "references": [
      "FIFUZZ"
    ],
    "author": [
      "Yuanliang Chen"
    ],
    "toolurl": "https://github.com/SecTechTool/Chronos",
    "title": "Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2024/313000a109/1Ub23heRtUA"
    ],
    "keywords": [
      "distributed system fuzzing"
    ]
  },
  {
    "name": "ClozeMaster",
    "year": "2025",
    "targets": [
      "Compiler"
    ],
    "color": "blackbox",
    "references": [
      "RustSmith"
    ],
    "author": [
      "Hongyan Gao",
      "Yibiao Yang",
      "Maolin Sun",
      "Jiangchang Wu",
      "Yuming Zhou",
      "Baowen Xu"
    ],
    "toolurl": "https://github.com/clozeMasterPro/clozeMaster",
    "title": "Clozemaster: Fuzzing Rust Compiler by Harnessing Llms for Infilling Masked Real Programs",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://ieeexplore.ieee.org/document/11029729"
    ],
    "keywords": [
      "LLM"
    ]
  },
  {
    "name": "CoFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "whitebox",
    "author": [
      "Ling Jiang",
      "Hengchen Yuan",
      "Mingyuan Wu",
      "Lingming Zhang",
      "Yuqun Zhang"
    ],
    "toolurl": "https://github.com/Tricker-z/CoFuzz",
    "title": "Evaluating and Imporving Hybrid Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "AFL",
      "QSYM"
    ],
    "miscurl": [
      "https://lingming.cs.illinois.edu/publications/icse2023f.pdf"
    ],
    "keywords": [
      "Hybrid fuzzing",
      "concolic execution"
    ]
  },
  {
    "name": "CodeAlchemist",
    "year": 2019,
    "author": [
      "HyungSeok Han",
      "DongHyeon Oh",
      "Sang Kil Cha"
    ],
    "title": "CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/SoftSec-KAIST/CodeAlchemist",
    "targets": [
      "JavaScript"
    ],
    "references": [
      "LangFuzz",
      "IFuzzer"
    ],
    "color": "blackbox"
  },
  {
    "name": "CollAFL",
    "year": 2018,
    "author": [
      "Shuitao Gan",
      "Chao Zhang",
      "Xiaojun Qin",
      "Xuwen Tu",
      "Kang Li",
      "Zhongyu Pei",
      "Zuoning Chen"
    ],
    "title": "CollAFL: Path Sensitive Fuzzing",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "ComFuzz",
    "year": 2023,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Guixin Ye",
      "Tianmin Hu",
      "Zhanyong Tang",
      "Zhenye Fan",
      "Shin Hwei Tan",
      "Bo Zhang",
      "Wenxiang Qian",
      "Zheng Wang"
    ],
    "toolurl": "https://github.com/NWU-NISL-Fuzzing/COMFUZZ",
    "title": "A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "COMFORT"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3611643.3616332"
    ]
  },
  {
    "name": "ConfigFuzz",
    "year": "2023",
    "targets": [
      "Program configuration"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Zenong Zhang",
      "George Klees",
      "Eric Wang",
      "Michael Hicks",
      "Shiyi Wei"
    ],
    "title": "Fuzzing Configurations of Program Options",
    "booktitle": "ACM Transactions on Software Engineering and Methodology",
    "miscurl": [
      "https://dl.acm.org/doi/10.1145/3580597"
    ]
  },
  {
    "name": "ContractFuzzer",
    "year": 2018,
    "author": [
      "Bo Jiang",
      "Ye Liu",
      "Wing-Kwong Chan"
    ],
    "title": "ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/gongbell/ContractFuzzer",
    "targets": [
      "EVM"
    ],
    "references": [
      "Echidna"
    ],
    "color": "blackbox"
  },
  {
    "name": "CorbFuzz",
    "year": 2021,
    "author": [
      "Chaofan Shou",
      "Ismet Burak Kadron",
      "Qi Su",
      "Tevfik Bultan"
    ],
    "title": "CorbFuzz: Checking Browser Security Policies with Fuzzing",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://arxiv.org/pdf/2109.00398.pdf"
    ],
    "toolurl": "https://github.com/shouc/corbfuzz",
    "targets": [
      "Web"
    ],
    "color": "whitebox"
  },
  {
    "name": "CountDown",
    "year": "2024",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "author": [
      "Shuangpeng Bai",
      "Zhechang Zhang",
      "Hong Hu"
    ],
    "toolurl": "https://github.com/psu-security-universe/countdown",
    "title": "CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3658644.3690320"
    ],
    "references": [
      "syzkaller"
    ],
    "keywords": [
      "kernel"
    ]
  },
  {
    "name": "Creal",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "blackbox",
    "references": [
      "CSmith"
    ],
    "author": [
      "Shaohua Li",
      "Theodoros Theodoridis",
      "Zhendong Su"
    ],
    "toolurl": "https://github.com/UniCodeSphere/Creal",
    "title": "Boosting Compiler Testing by Injecting Real-World Code",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "miscurl": [
      "https://dl.acm.org/doi/abs/10.1145/3656386"
    ],
    "keywords": [
      "compiler fuzzing",
      "real-world code"
    ]
  },
  {
    "name": "CrossFire",
    "year": "2024",
    "targets": [
      "XPU"
    ],
    "color": "greybox",
    "author": [
      "Jiaxun Zhu",
      "Minghao Lin",
      "Tingting Yin",
      "Zechao Cai",
      "Yu Wang",
      "Rui Chang",
      "Wenbo Shen"
    ],
    "toolurl": "https://github.com/ZJU-SEC/CrossFire",
    "title": "CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3658644.3690376"
    ],
    "references": [
      "syzkaller"
    ],
    "keywords": [
      "macOS",
      "Apple",
      "XPU"
    ]
  },
  {
    "name": "DAFL",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFLGo"
    ],
    "author": [
      "Tae Eun Kim",
      "Jaeseung Choi",
      "Kihong Heo",
      "Sang Kil Cha"
    ],
    "toolurl": "https://github.com/prosyslab/DAFL-artifact",
    "title": "DAFL: Directed Grey-box Fuzzing Guided by Data Dependency",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-kim-tae-eun.pdf"
    ]
  },
  {
    "name": "DDRace",
    "year": 2023,
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "author": [
      "Ming Yuan",
      "Bodong Zhao",
      "Penghui Li",
      "Jiashuo Liang",
      "Xinhui Han",
      "Xiapu Luo",
      "Chao Zhang"
    ],
    "toolurl": "https://github.com/vul337/DDRace",
    "title": "DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "syzkaller",
      "Krace"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-yuan-ming.pdf"
    ]
  },
  {
    "name": "DELTA",
    "year": 2017,
    "author": [
      "Seungsoo Lee",
      "Changhoon Yoon",
      "Chanhee Lee",
      "Seungwon Shin",
      "Vinod Yegneswaran",
      "Phillip Porras"
    ],
    "title": "DELTA: A security assessment framework for software-defined networks",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/seungsoo-lee/DELTA",
    "miscurl": [
      "http://seungsoo.net/papers/delta.pdf"
    ],
    "references": [
      "BFF"
    ],
    "targets": [
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "DFUZZ",
    "year": "2025",
    "targets": [
      "API"
    ],
    "color": "whitebox",
    "references": [
      "FuzzGPT"
    ],
    "author": [
      "Kunpeng Zhang",
      "Shuai Wang",
      "Jitao Han",
      "Xiaogang Zhu",
      "Xian Li",
      "Shaohua Wang",
      "Sheng Wen"
    ],
    "toolurl": "https://github.com/DFUZZ-ICSE/DFUZZ",
    "title": "Your Fix Is My Exploit: Enabling Comprehensive DL Library API Fuzzing with Large Language Models ",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://doi.org/10.48550/arXiv.2501.04312"
    ],
    "keywords": [
      "deep learning libraries fuzzing"
    ]
  },
  {
    "name": "DIANE",
    "year": 2021,
    "author": [
      "Nilo Redini",
      "Andrea Continella",
      "Dipanjan Das",
      "Giulio De Pasquale",
      "Noah Spahn",
      "Aravind Machiry",
      "Antonio Bianchi",
      "Christopher Kruegel",
      "Giovanni Vigna"
    ],
    "title": "DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "toolurl": "https://github.com/ucsb-seclab/diane",
    "miscurl": [
      "https://conand.me/publications/redini-diane-2021.pdf"
    ],
    "references": [
      "IoTFuzzer"
    ],
    "targets": [
      "IoT"
    ],
    "color": "blackbox"
  },
  {
    "name": "DIFUZE",
    "year": 2017,
    "author": [
      "Jake Corina",
      "Aravind Machiry",
      "Christopher Salls",
      "Yan Shoshitaishvili",
      "Shuang Hao",
      "Christopher Kruegel",
      "Giovanni Vigna"
    ],
    "title": "DIFUZE: Interface Aware Fuzzing for Kernel Drivers",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "toolurl": "https://github.com/ucsb-seclab/difuze",
    "references": [
      "syzkaller"
    ],
    "targets": [
      "Kernel"
    ],
    "color": "blackbox"
  },
  {
    "name": "DOMFuzz",
    "year": 2008,
    "author": [
      "Jesse Ruderman"
    ],
    "toolurl": "https://github.com/MozillaSecurity/funfuzz",
    "targets": [
      "DOM"
    ],
    "references": [
      "jsfunfuzz"
    ],
    "color": "blackbox",
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "DR.FUZZ",
    "year": 2022,
    "author": [
      "Wenjia Zhao",
      "Kangjie Lu",
      "Qiushi Wu",
      "Yong Qi"
    ],
    "title": "Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/secsysresearch/DRFuzz",
    "targets": [
      "Kernel"
    ],
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2022-345-paper.pdf"
    ],
    "references": [
      "syzkaller"
    ],
    "color": "greybox"
  },
  {
    "name": "DSFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "ParmeSan"
    ],
    "author": [
      "Yinxi Liu",
      "Wei Meng"
    ],
    "title": "DSFuzz: Detecting Deep State Bugs with Dependent State Exploration",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3576915.3616594"
    ]
  },
  {
    "name": "DUMPLING",
    "year": "2025",
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "references": [
      "Fuzzilli",
      "Jit-Picker"
    ],
    "author": [
      "Liam Wachter",
      "Julian Gremminger",
      "Christian Wressnegger",
      "Mathias Payer",
      "Flavio Toffalini"
    ],
    "toolurl": "https://github.com/two-heart/dumpling-artifact-evaluation",
    "title": "DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.241411"
    ],
    "keywords": [
      "javascript",
      "jit",
      "differential fuzzing"
    ]
  },
  {
    "name": "DarthShader",
    "year": "2024",
    "targets": [
      "WGSL"
    ],
    "color": "greybox",
    "references": [
      "CSmith"
    ],
    "author": [
      "Lukas Bernhard",
      "Nico Schiller",
      "Moritz Schloegel",
      "Nils Bars",
      "Thorsten Holz"
    ],
    "toolurl": "https://github.com/wgslfuzz/darthshader",
    "title": "DarthShader: Fuzzing WebGPU Shader Translators & Compilers",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://web3.arxiv.org/pdf/2409.01824"
    ],
    "keywords": [
      "WGSL",
      "shader"
    ]
  },
  {
    "name": "DeadlockFuzzer",
    "year": 2009,
    "author": [
      "Pallavi Joshi",
      "Chang-Seo Park",
      "Koushik Sen",
      "Mayur Naik"
    ],
    "title": "A Randomized Dynamic Program Analysis Technique for Detecting Real Deadlocks",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "toolurl": "https://github.com/ksen007/calfuzzer",
    "targets": [
      "Concurrency"
    ],
    "references": [
      "CalFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "DeepGo",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFLGo"
    ],
    "author": [
      "Peihong Lin",
      "Pengfei Wang",
      "Xu Zhou",
      "Wei Xie",
      "Gen Zhang",
      "Kai Lu"
    ],
    "toolurl": "https://gitee.com/paynelin/DeepGo",
    "title": "DeepGo: Predictive Directed Greybox Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2024-514-paper.pdf"
    ],
    "keywords": [
      "Directed fuzzing"
    ]
  },
  {
    "name": "DeepREL",
    "year": "2022",
    "targets": [
      "Lib"
    ],
    "color": "greybox",
    "author": [
      "Yinlin Deng",
      "Chenyuan Yang",
      "Anjiang Wei",
      "Lingming Zhang"
    ],
    "toolurl": "https://github.com/ise-uiuc/DeepREL",
    "title": "Fuzzing Deep-Learning Libraries via Automated Relational API Inference",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "FreeFuzz"
    ]
  },
  {
    "name": "DepFuzz",
    "year": "2023",
    "targets": [
      "DISC (Data-Intensive Scalable Computing) Systems"
    ],
    "color": "greybox",
    "references": [
      "BigFuzz"
    ],
    "author": [
      "Ahmad Humayun",
      "Miryung Kim",
      "Muhammad Ali Gulzar"
    ],
    "toolurl": "https://github.com/SEED-VT/DepFuzz",
    "title": "Co-dependence Aware Fuzzing for Dataflow-Based Big Data Analytics",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://people.cs.vt.edu/~gulzar/assets/pdf/depfuzz.pdf"
    ]
  },
  {
    "name": "Dewey et al.",
    "year": 2014,
    "author": [
      "Kyle Dewey",
      "Jared Roesch",
      "Ben Hardekopf"
    ],
    "title": "Language Fuzzing Using Constraint Logic Programming",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://sites.cs.ucsb.edu/~benh/research/papers/dewey14language.pdf",
      "https://ieeexplore.ieee.org/abstract/document/7372036"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "LangFuzz",
      "CSmith"
    ],
    "color": "blackbox"
  },
  {
    "name": "Dharma",
    "year": 2015,
    "author": [
      "Christoph Diehl"
    ],
    "toolurl": "https://github.com/MozillaSecurity/dharma",
    "targets": [
      "File",
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "Die",
    "year": 2020,
    "author": [
      "Soyeon Park",
      "Wen Xu",
      "Insu Yun",
      "Daehee Jang",
      "Taesoo Kim"
    ],
    "title": "Fuzzing JavaScript Engines with Aspect-preserving Mutation",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "targets": [
      "JavaScript"
    ],
    "references": [
      "CodeAlchemist",
      "Superion"
    ],
    "color": "greybox"
  },
  {
    "name": "DifFuzz",
    "year": 2019,
    "author": [
      "Shirin Nilizadeh",
      "Yannic Noller",
      "Corina S. Păsăreanu"
    ],
    "title": "DIFFUZZ: Differential Fuzzing for Side-Channel Analysis",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/isstac/diffuzz",
    "miscurl": [
      "https://yannicnoller.github.io/publications/icse2019_nilizadeh_diffuzz.pdf"
    ],
    "targets": [
      "Side-channel"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "DifuzzRTL",
    "year": 2021,
    "author": [
      "Jaewon Hur",
      "Suhwan Song",
      "Dongup Kwon",
      "Eunjin Baek",
      "Jangwoo Kim",
      "Byoungyoung Lee"
    ],
    "title": "DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://lifeasageek.github.io/papers/jaewon-difuzzrtl.pdf"
    ],
    "targets": [
      "CPU"
    ],
    "toolurl": "https://github.com/compsec-snu/difuzz-rtl",
    "references": [
      "classming"
    ],
    "color": "greybox",
    "keywords": [
      "Register-coverage"
    ]
  },
  {
    "name": "DigFuzz",
    "year": 2019,
    "author": [
      "Lei Zhao",
      "Yue Duan",
      "Heng Yin",
      "Jifeng Xuan"
    ],
    "title": "Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.cs.ucr.edu/~heng/pubs/digfuzz_ndss19.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "Driller"
    ],
    "color": "whitebox"
  },
  {
    "name": "Digtool",
    "year": 2017,
    "author": [
      "Jianfeng Pan",
      "Guanglu Yan",
      "Xiaocao Fan"
    ],
    "title": "Digtool: A virtualization-based framework for detecting kernel vulnerabilities",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-pan.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "color": "blackbox"
  },
  {
    "name": "DistFuzz",
    "year": "2025",
    "targets": [
      "Network"
    ],
    "color": "blackbox",
    "references": [
      "Mallory"
    ],
    "author": [
      "Yonghao Zou",
      "Jia-Ju Bai",
      "Zu-Ming Jiang",
      "Ming Zhao",
      "Diyu Zhou"
    ],
    "toolurl": "https://github.com/zouyonghao/DistFuzz",
    "title": "DistFuzz: Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.241912"
    ],
    "keywords": [
      "distributed systems"
    ]
  },
  {
    "name": "Domato",
    "year": "2017",
    "targets": [
      "DOM"
    ],
    "color": "blackbox",
    "author": [
      "Ivan Fratric"
    ],
    "toolurl": "https://github.com/googleprojectzero/domato",
    "references": [
      "DOMFuzz"
    ],
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "Doupé et al.",
    "year": 2012,
    "author": [
      "Adam Doupé",
      "Ludovico Cavedon",
      "Christopher Kruegel",
      "Giovanni Vigna"
    ],
    "title": "Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final225.pdf"
    ],
    "targets": [
      "Web"
    ],
    "color": "blackbox"
  },
  {
    "name": "Dowser",
    "year": 2013,
    "author": [
      "Istvan Haller",
      "Asia Slowinska",
      "Matthias Neugschwandtner",
      "Herbert Bos"
    ],
    "title": "Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/conference/usenixsecurity13/sec13-paper_haller.pdf"
    ],
    "references": [
      "FuzzBALL"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "Drifuzz",
    "year": 2022,
    "targets": [
      "Kernel"
    ],
    "color": "whitebox",
    "author": [
      "Zekun Shen",
      "Ritik Roongta",
      "Brendan Dolan-Gavitt"
    ],
    "toolurl": "https://github.com/messlabnyu/DrifuzzProject",
    "title": "Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "kAFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-shen-zekun.pdf"
    ]
  },
  {
    "name": "Driller",
    "year": 2016,
    "author": [
      "Nick Stephens",
      "John Grosen",
      "Christopher Salls",
      "Andrew Dutcher",
      "Ruoyu Wang",
      "Jacopo Corbetta",
      "Yan Shoshitaishvili",
      "Christopher Kruegel",
      "Giovanni Vigna"
    ],
    "title": "Driller: Augmenting Fuzzing Through Selective Symbolic Execution",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/shellphish/driller",
    "miscurl": [
      "https://sites.cs.ucsb.edu/~chris/research/doc/ndss16_driller.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL",
      "Dowser"
    ],
    "color": "whitebox"
  },
  {
    "name": "DynSQL",
    "year": 2023,
    "targets": [
      "DBMS"
    ],
    "color": "greybox",
    "author": [
      "Zu-Ming Jiang",
      "Jia-Ju Bai",
      "Zhendong Su"
    ],
    "title": "DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Squirrel",
      "AFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-jiang-zu-ming.pdf"
    ]
  },
  {
    "name": "EASIER",
    "year": 2020,
    "author": [
      "Ivan Pustogarov",
      "Qian Wu",
      "David Lie"
    ],
    "title": "Ex-vivo dynamic analysis framework for Android device drivers",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://security.csl.toronto.edu/wp-content/uploads/2020/05/pustogarov-oakland2020-easier.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "references": [
      "syzkaller",
      "kAFL"
    ],
    "color": "greybox"
  },
  {
    "name": "ECFuzz",
    "year": "2024",
    "targets": [
      "Program configuration"
    ],
    "color": "blackbox",
    "references": [
      "ConfigFuzz"
    ],
    "author": [
      "Junqiang Li",
      "Senyi Li",
      "Keyao Li",
      "Falin Luo",
      "Hongfang Yu",
      "Shanshan Li",
      "Xiang Li"
    ],
    "toolurl": "https://github.com/ecfuzz/ECFuzz",
    "title": "ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3597503.3623315"
    ]
  },
  {
    "name": "EDEFuzz",
    "year": "2024",
    "targets": [
      "API"
    ],
    "color": "blackbox",
    "references": [
      "RESTler"
    ],
    "author": [
      "Lianglu Pan",
      "Shaanan Cohney",
      "Toby Murray",
      "Van-Thuan Pham"
    ],
    "toolurl": "https://github.com/Broken-Assumptions/EDEFuzz",
    "title": "EDEFuzz: A Web API Fuzzer for Excessive Data Exposures",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://dl.acm.org/doi/10.1145/3597503.3608133"
    ]
  },
  {
    "name": "EFS",
    "year": 2007,
    "author": [
      "Jared DeMott",
      "Richard Enbody",
      "William F. Punch"
    ],
    "title": "Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing",
    "booktitle": "Proceedings of DefCon",
    "targets": [
      "File",
      "Network"
    ],
    "references": [
      "Sidewinder",
      "GPF"
    ],
    "miscurl": [
      "https://www.defcon.org/images/defcon-15/dc15-presentations/dc-15-demott_enbody_and_punch.pdf"
    ],
    "color": "greybox"
  },
  {
    "name": "EL3XIR",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Christian Lindenmeier",
      "Mathias Payer",
      "Marcel Busch"
    ],
    "toolurl": "https://github.com/HexHive/EL3XIR",
    "title": "EL3XIR: Fuzzing COTS Secure Monitors",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL++",
      "TriforceAFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-lindenmeier.pdf"
    ]
  },
  {
    "name": "EMS",
    "year": 2022,
    "author": [
      "Chenyang Lyu",
      "Shouling Ji",
      "Xuhong Zhang",
      "Hong Liang",
      "Binbin Zhao",
      "Kangjie Lu",
      "Raheem Beyah"
    ],
    "title": "EMS: History-Driven Mutation for Coverage-based Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://nesa.zju.edu.cn/download/lcy_pdf_ems_ndss22.pdf"
    ],
    "toolurl": "https://github.com/puppet-meteor/EMS",
    "targets": [
      "File"
    ],
    "references": [
      "MOPT"
    ],
    "color": "greybox"
  },
  {
    "name": "Echidna",
    "year": 2018,
    "author": [
      "Crytic"
    ],
    "toolurl": "https://github.com/crytic/echidna",
    "targets": [
      "EVM"
    ],
    "color": "greybox"
  },
  {
    "name": "Eclipser",
    "year": 2019,
    "author": [
      "Jaeseung Choi",
      "Joonun Jang",
      "Choongwoo Han",
      "Sang Kil Cha"
    ],
    "title": "Grey-box Concolic Testing on Binary Code",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "toolurl": "https://github.com/SoftSec-KAIST/Eclipser",
    "miscurl": [
      "https://softsec.kaist.ac.kr/~jschoi/data/icse2019.pdf"
    ],
    "targets": [
      "Argument",
      "File"
    ],
    "references": [
      "AFL",
      "SAGE"
    ],
    "color": "greybox"
  },
  {
    "name": "EcoFuzz",
    "year": 2020,
    "author": [
      "Tai Yue",
      "Pengfei Wang",
      "Yong Tang",
      "Enze Wang",
      "Bo Yu",
      "Kai Lu",
      "Xu Zhou"
    ],
    "title": "EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "https://github.com/MoonLight-SteinsGate/EcoFuzz",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20-yue.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFLFast"
    ],
    "color": "greybox"
  },
  {
    "name": "EcuFuzz",
    "year": "2025",
    "targets": [
      "Firmware"
    ],
    "color": "blackbox",
    "references": [
      "SHiFT"
    ],
    "author": [
      "Qicai Chen",
      "Kun Hu",
      "Sichen Gong",
      "Bihuan Chen",
      "Zikui Kong",
      "Haowen Jiang",
      "Bingkun Sun",
      "You Lu",
      "Xin Peng"
    ],
    "title": "Structure-Aware, Diagnosis-Guided ECU Firmware Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3728914"
    ],
    "keywords": [
      "ECU"
    ]
  },
  {
    "name": "EnFuzz",
    "year": 2019,
    "author": [
      "Yuanliang Chen",
      "Yu Jiang",
      "Fuchen Ma",
      "Jie Liang",
      "Mingzhe Wang",
      "Chijin Zhou",
      "Xun Jiao",
      "Zhuo Su"
    ],
    "title": "EnFuzz: Ensemble Fuzzing with Seed Synchronization among Diverse Fuzzers",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "https://github.com/enfuzz/enfuzz",
    "miscurl": [
      "https://www.usenix.org/system/files/sec19-chen-yuanliang.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "radamsa"
    ],
    "color": "greybox"
  },
  {
    "name": "EnclaveFuzz",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "SGXFuzz"
    ],
    "author": [
      "Liheng Chen",
      "Zheming Li",
      "Zheyu Ma",
      "Yuan Li",
      "Baojian Chen",
      "Chao Zhang"
    ],
    "toolurl": "https://github.com/LeoneChen/EnclaveFuzz",
    "title": "EnclaveFuzz: Finding Vulnerabilities in SGX Applications",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2024-819-paper.pdf"
    ]
  },
  {
    "name": "Entropic",
    "year": 2020,
    "author": [
      "Marcel Böhme",
      "Valentin J.M. Manès",
      "Sang Kil Cha"
    ],
    "title": "Boosting Fuzzer Efficiency: An Information Theoretic Perspective",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "toolurl": "https://github.com/llvm/llvm-project/commit/e2e38fca64e49d684de0b100437fe2f227f8fcdd",
    "miscurl": [
      "https://mboehme.github.io/paper/FSE20.Entropy.pdf"
    ],
    "targets": [
      "Lib"
    ],
    "references": [
      "LibFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "EnvFuzz",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFLNet"
    ],
    "author": [
      "Ruijie Meng",
      "Gregory J. Duck",
      "Abhik Roychoudhury"
    ],
    "toolurl": "https://github.com/GJDuck/EnvFuzz",
    "title": "Program Environment Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://arxiv.org/pdf/2404.13951"
    ]
  },
  {
    "name": "FANS",
    "year": 2020,
    "author": [
      "Baozheng Liu",
      "Chao Zhang",
      "Guang Gong",
      "Yishun Zeng",
      "Haifeng Ruan",
      "Jianwei Zhuge"
    ],
    "title": "FANS: Fuzzing Android Native System Services via Automated Interface Analysis",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "https://github.com/iromise/fans",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20fall_liu_prepub.pdf"
    ],
    "targets": [
      "API"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "FAST",
    "year": "2023",
    "targets": [
      "Specification"
    ],
    "color": "greybox",
    "author": [
      "Ru Ji",
      "Meng Xu"
    ],
    "title": "Finding Specification Blind Spots via Fuzz Testing",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2023/933600c708/1Nrc04SNlCw"
    ],
    "keywords": [
      "fuzzing",
      "mutation testing"
    ]
  },
  {
    "name": "FIFUZZ",
    "year": 2020,
    "author": [
      "Zu-Ming Jiang",
      "Jia-Ju Bai",
      "Kangjie Lu",
      "Shi-Min Hu"
    ],
    "title": "Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www-users.cs.umn.edu/~kjlu/papers/fifuzz.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "FIRM-AFL",
    "year": 2019,
    "author": [
      "Yaowen Zheng",
      "Ali Davanian",
      "Heng Yin",
      "Chengyu Song",
      "Hongsong Zhu",
      "Limin Sun"
    ],
    "title": "FIRM-AFL: High-Throughput Greybox Fuzzing of IoT Firmware via Augmented Process Emulation",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "https://github.com/zyw-200/FirmAFL",
    "targets": [
      "Firmware"
    ],
    "references": [
      "AFL",
      "TriforceAFL"
    ],
    "color": "greybox"
  },
  {
    "name": "FLAX",
    "year": 2010,
    "author": [
      "Prateek Saxena",
      "Steve Hanna",
      "Pongsin Poosankam",
      "Dawn Song"
    ],
    "title": "FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "http://webblaze.cs.berkeley.edu/2010/flax/flax.pdf"
    ],
    "targets": [
      "Web"
    ],
    "color": "blackbox"
  },
  {
    "name": "FLUX",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "LibFuzzer",
      "LangFuzz"
    ],
    "author": [
      "Eric Liu",
      "Shengjie Xu",
      "David Lie"
    ],
    "toolurl": "https://github.com/ericliuu/flux",
    "title": "FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://security.csl.toronto.edu/wp-content/uploads/2023/09/eliu-ase2023-flux.pdf"
    ]
  },
  {
    "name": "FOE",
    "year": 2012,
    "author": [
      "CERT"
    ],
    "toolurl": "https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=515311",
    "targets": [
      "File"
    ],
    "references": [
      "BFF"
    ],
    "color": "blackbox"
  },
  {
    "name": "FORKY",
    "year": "2025",
    "targets": [
      "Blockchain"
    ],
    "color": "greybox",
    "references": [
      "LOKI"
    ],
    "author": [
      "Seongmin Kim",
      "Jaeseong Kwon",
      "Kihong Heo",
      "Juneyoung Lee"
    ],
    "toolurl": "https://github.com/NetSP-KAIST/forky",
    "title": "Fork State-Aware Differential Fuzzing for Blockchain Consensus Implementations",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://ieeexplore.ieee.org/document/11029786"
    ],
    "keywords": [
      "blockchain",
      "differential testing"
    ]
  },
  {
    "name": "FOX",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL++"
    ],
    "author": [
      "Dongdong She",
      "Adam Storek",
      "Yuchong Xie",
      "Seoyoung Kweon",
      "Prashast Srivastava",
      "Suman Jana"
    ],
    "toolurl": "https://github.com/FOX-Fuzz/FOX",
    "title": "FOX: Coverage-guided Fuzzing as Online Stochastic Control",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://arxiv.org/pdf/2406.04517"
    ],
    "keywords": [
      "frontier branch"
    ]
  },
  {
    "name": "FUTURE",
    "year": "2024",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "references": [
      "NablaFuzz"
    ],
    "author": [
      "Zhiyuan Li",
      "Jingzheng Wu",
      "Xiang Ling",
      "Tianyue Luo",
      "Zhiqing Rui",
      "Yanjun Wu"
    ],
    "toolurl": "https://github.com/Redmept1on/FUTURE",
    "title": "The Seeds of the FUTURE Sprout from History: Fuzzing for Unveiling Vulnerabilities in Prospective Deep-Learning Libraries",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://arxiv.org/abs/2412.01317"
    ],
    "keywords": [
      "deep learning libraries",
      "LLM",
      "differential testing"
    ]
  },
  {
    "name": "FUZZPD",
    "year": "2023",
    "targets": [
      "Firmware"
    ],
    "color": "blackbox",
    "references": [
      "IoTFuzzer"
    ],
    "author": [
      "Kyungtae Kim",
      "Sungwoo Kim",
      "Kevin R. B. Butler",
      "Antonio Bianchi",
      "Rick Kennell",
      "Dave (Jing) Tian"
    ],
    "toolurl": "https://github.com/purseclab/fuzzpd",
    "title": "Fuzz The Power: Dual-role State Guided Black-box Fuzzing for USB Power Delivery",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-kim-kyungtae.pdf"
    ]
  },
  {
    "name": "FUZZUSB",
    "year": 2022,
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "author": [
      "Kyungtae Kim",
      "Taegyu Kim",
      "Ertza Warraich",
      "Byoungyoung Lee"
    ],
    "toolurl": "https://github.com/purseclab/fuzzusb",
    "title": "FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "references": [
      "syzkaller"
    ],
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2022/131600a632/1A4Q3mz4uLm"
    ]
  },
  {
    "name": "FairFuzz",
    "year": 2018,
    "author": [
      "Caroline Lemieux",
      "Koushik Sen"
    ],
    "title": "FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/carolemieux/afl-rb/",
    "miscurl": [
      "https://www.carolemieux.com/fairfuzz-ase18.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "Favocado",
    "year": 2021,
    "author": [
      "Sung Ta Dinh",
      "Haehyun Cho",
      "Kyle Martin",
      "Adam Oest",
      "Kyle Zeng",
      "Alexandros Kapravelos",
      "Gail-Joon Ahn",
      "Tiffany Bao",
      "Ruoyu Wang",
      "Adam Doupé",
      "Yan Shoshitaishvili"
    ],
    "title": "Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/favocado/Favocado",
    "miscurl": [
      "https://sefcom.asu.edu/publications/favocado-ndss21.pdf"
    ],
    "targets": [
      "JavaScript"
    ],
    "references": [
      "CodeAlchemist"
    ],
    "color": "greybox"
  },
  {
    "name": "FileFuzz",
    "year": 2005,
    "author": [
      "Michael Sutton",
      "Adam Greene"
    ],
    "title": "The Art of File Format Fuzzing",
    "booktitle": "Proceedings of the Black Hat Asia",
    "toolurl": "https://packetstormsecurity.com/files/download/39626/FileFuzz.zip",
    "targets": [
      "File"
    ],
    "references": [
      "SPIKE",
      "SPIKEfile"
    ],
    "color": "blackbox"
  },
  {
    "name": "FishFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFLGo",
      "AFL"
    ],
    "author": [
      "Han Zheng",
      "Jiayuan Zhang",
      "Yuhang Huang",
      "Zezhong Ren",
      "He Wang",
      "Chunjie Cao",
      "Yuqing Zhang",
      "Flavio Toffalini",
      "Mathias Payer"
    ],
    "toolurl": "https://github.com/HexHive/FishFuzz",
    "title": "FishFuzz: Catch Deeper Bugs by Throwing Larger Nets",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-zheng.pdf"
    ]
  },
  {
    "name": "Flakjack",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL++"
    ],
    "author": [
      "Arvind S Raj",
      "Wil Gibbs",
      "Fangzhou Dong",
      "Jayakrishna Menon Vadayath",
      "Michael Tompkins",
      "Steven Wirsz",
      "Yibo Liu",
      "Zhenghao Hu",
      "Chang Zhu",
      "Gokulkrishna Praveen Menon",
      "Brendan Dolan-Gavitt",
      "Adam Doupé",
      "Ruoyu Wang",
      "Yan Shoshitaishvili",
      "Tiffany Bao"
    ],
    "toolurl": "https://github.com/sefcom/flakjack",
    "title": "Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security"
  },
  {
    "name": "Fluffy",
    "year": "2023",
    "targets": [
      "Blockchain"
    ],
    "color": "greybox",
    "author": [
      "Youngseok Yang",
      "Taesoo Kim",
      "Byung-Gon Chun"
    ],
    "toolurl": "https://github.com/snuspl/fluffy",
    "title": "Finding Consensus Bugs in Ethereum via Multi-transaction Differential Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "LibFuzzer"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/osdi21-yang.pdf"
    ]
  },
  {
    "name": "Frankenstein",
    "year": 2020,
    "author": [
      "Jan Ruge",
      "Jiska Classen",
      "Francesco Gringoli",
      "Matthias Hollick"
    ],
    "title": "Frankenstein: Advanced Wireless Fuzzing to Exploit New Bluetooth Escalation Targets",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20-ruge.pdf"
    ],
    "targets": [
      "Firmware"
    ],
    "color": "greybox"
  },
  {
    "name": "FreeDom",
    "year": 2020,
    "author": [
      "Wen Xu",
      "Soyeon Park",
      "Taesoo Kim"
    ],
    "title": "FreeDom: Engineering a State-of-the-Art DOM Fuzzer",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "toolurl": "https://github.com/sslab-gatech/freedom",
    "miscurl": [
      "https://gts3.org/assets/papers/2020/xu:freedom.pdf"
    ],
    "targets": [
      "DOM"
    ],
    "references": [
      "Dharma"
    ],
    "color": "greybox"
  },
  {
    "name": "FreeFuzz",
    "year": 2022,
    "targets": [
      "API"
    ],
    "color": "greybox",
    "author": [
      "Anjiang Wei",
      "Yinlin Deng",
      "Chenyuan Yang",
      "Lingming Zhang"
    ],
    "toolurl": "https://github.com/ise-uiuc/FreeFuzz",
    "title": "Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://cs.stanford.edu/~anjiang/papers/WeiETAL22FreeFuzz.pdf"
    ]
  },
  {
    "name": "FreeWavm",
    "year": "2025",
    "targets": [
      "WebAssembly"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Peng Qian",
      "Xinlei Ying",
      "Jiashui Wang",
      "Long Liu",
      "Lun Zhang",
      "Jianhai Chen",
      "Qinming He"
    ],
    "toolurl": "https://github.com/Messi-Q/FreeWavm",
    "title": "FreeWavm: Enhanced WebAssembly Runtime Fuzzing Guided by Parse Tree Mutation and Snapshot",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3728877"
    ]
  },
  {
    "name": "Fuzz4All",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "YARPGen",
      "ChatAFL"
    ],
    "author": [
      "Chunqiu Steven Xia",
      "Matteo Paltenghi",
      "Jia Le Tian",
      "Michael Pradel",
      "Lingming Zhang"
    ],
    "toolurl": "https://github.com/fuzz4all/fuzz4all",
    "title": "Fuzz4All: Universal Fuzzing with Large Language Models",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://arxiv.org/pdf/2308.04748"
    ],
    "keywords": [
      "LLM"
    ]
  },
  {
    "name": "FuzzBALL",
    "year": 2011,
    "author": [
      "Domagoj Babic",
      "Lorenzo Martignoni",
      "Stephen McCamant",
      "Dawn Song"
    ],
    "title": "Statically-Directed Dynamic Automated Test Generation",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "toolurl": "https://github.com/bitblaze-fuzzball/fuzzball",
    "miscurl": [
      "http://bitblaze.cs.berkeley.edu/papers/testgen-issta11.pdf",
      "https://apps.dtic.mil/dtic/tr/fulltext/u2/a587051.pdf",
      "http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.261.2500&rep=rep1&type=pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "TaintScope"
    ],
    "color": "whitebox"
  },
  {
    "name": "FuzzDelSol",
    "year": "2023",
    "targets": [
      "Solana Smart Contract"
    ],
    "color": "greybox",
    "references": [
      "LibAFL"
    ],
    "author": [
      "Sven Smolka",
      "Jens-Rene Giesen",
      "Pascal Winkler",
      "Oussama Draissi",
      "Lucas Davi",
      "Ghassan Karame",
      "Klaus Pohl"
    ],
    "title": "Fuzz on the Beach: Fuzzing Solana Smart Contracts",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/10.1145/3576915.3623178"
    ]
  },
  {
    "name": "FuzzFlow",
    "year": "2024",
    "targets": [
      "JS Engine"
    ],
    "color": "greybox",
    "author": [
      "Haoran Xu",
      "Zhiyuan Jiang",
      "Yongjun Wang",
      "Shuhui Fan",
      "Shenglin Xu",
      "Peidai Xie",
      "Shaojing Fu",
      "Mathias Payer"
    ],
    "toolurl": "https://github.com/walkcreate/FuzzFlow",
    "title": "Fuzzing JavaScript Engines with a Graph-based IR",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3658644.3690336"
    ],
    "references": [
      "Fuzzilli"
    ],
    "keywords": [
      "js",
      "browser"
    ]
  },
  {
    "name": "FuzzGPT",
    "year": "2024",
    "targets": [
      "Deep Learning (DL) libraries"
    ],
    "color": "greybox",
    "references": [
      "FreeFuzz",
      "DeepREL"
    ],
    "author": [
      "Yinlin Deng",
      "Chunqiu Steven Xia",
      "Chenyuan Yang",
      "Shizhuo Dylan Zhang",
      "Shujing Yang",
      "Lingming Zhang"
    ],
    "toolurl": "https://github.com/ise-uiuc/FuzzGPT",
    "title": "Large Language Models are Edge-Case Generators: Crafting Unusual Programs for Fuzzing Deep Learning Libraries",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3597503.3623343"
    ],
    "keywords": [
      "Deep Learning",
      "libraries"
    ]
  },
  {
    "name": "FuzzInMem",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Xuwei Liu",
      "Wei You",
      "Yepeng Ye",
      "Zhuo Zhang",
      "Jianjun Huang",
      "Xiangyu Zhang"
    ],
    "title": "FuzzInMem: Fuzzing Programs via In-memory Structures",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "http://youwei.site/papers/ICSE2024.pdf"
    ],
    "keywords": [
      "PDF"
    ]
  },
  {
    "name": "FuzzJIT",
    "year": 2023,
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "author": [
      "Junjie Wang",
      "Zhiyi Zang",
      "Shuang Liu",
      "Xiaoning Du",
      "Junjie Chen"
    ],
    "toolurl": "https://github.com/SpaceNaN/fuzzjit",
    "title": "FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Fuzzilli"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-wang-junjie.pdf"
    ]
  },
  {
    "name": "FuzzNG",
    "year": "2023",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "author": [
      "Alexander Bulekov",
      "Bandan Das",
      "Stefan Hajnoczi",
      "Manuel Egele"
    ],
    "toolurl": "https://github.com/BUseclab/FuzzNG",
    "title": "No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Descriptions",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "references": [
      "syzkaller"
    ],
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f688_paper.pdf"
    ]
  },
  {
    "name": "FuzzOrigin",
    "year": 2022,
    "targets": [
      "DOM"
    ],
    "color": "greybox",
    "author": [
      "Sunwoo Kim",
      "Young Min Kim",
      "Jaewon Hur",
      "Suhwan Song",
      "Gwangmu Lee",
      "Byoungyoung Lee"
    ],
    "toolurl": "https://github.com/compsec-snu/fuzzorigin",
    "title": "FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "DOMFuzz",
      "Fuzzilli"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-kim.pdf"
    ]
  },
  {
    "name": "FuzzUEr",
    "year": "2025",
    "targets": [
      "Firmware"
    ],
    "color": "greybox",
    "references": [
      "LibAFL"
    ],
    "author": [
      "Connor Glosner",
      "Aravind Machiry"
    ],
    "toolurl": "https://github.com/BreakingBoot/FuzzUEr",
    "title": "FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2025-400-paper.pdf"
    ]
  },
  {
    "name": "Fuzzbox",
    "year": 2008,
    "author": [
      "David Thiel"
    ],
    "title": "Exposing Vulnerabilities in Media Software",
    "booktitle": "Proceedings of the Black Hat USA",
    "toolurl": "https://github.com/iSECPartners/fuzzbox",
    "miscurl": [
      "https://www.nccgroup.trust/globalassets/our-research/us/whitepapers/isec_thiel_exposing_vulnerabilities_media_software_0.pdf"
    ],
    "targets": [
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "Fuzzilli",
    "year": 2019,
    "author": [
      "Samuel Groß",
      "Simon Koch",
      "Lukas Bernhard",
      "Thorsten Holz",
      "Martin Johns"
    ],
    "targets": [
      "File"
    ],
    "title": "FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/googleprojectzero/fuzzilli",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f290_paper.pdf",
      "https://saelo.github.io/presentations/offensivecon_19_fuzzilli.pdf",
      "https://saelo.github.io/papers/thesis.pdf"
    ],
    "color": "greybox",
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "Fuzzolic",
    "year": 2021,
    "targets": [
      "File"
    ],
    "color": "whitebox",
    "author": [
      "Borzacchiello",
      "Luca and Coppa",
      "Emilio and Demetrescu",
      "Camil"
    ],
    "toolurl": "https://season-lab.github.io/fuzzolic/",
    "title": "Fuzzing Symbolic Expressions",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "QSYM"
    ],
    "miscurl": [
      "https://arxiv.org/pdf/2102.06580.pdf"
    ],
    "keywords": [
      "SMT"
    ]
  },
  {
    "name": "Fuzztruction",
    "year": 2023,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Nils Bars",
      "Moritz Schloegel",
      "Tobias Scharnowski",
      "Nico Schiller",
      "Thorsten Holz"
    ],
    "toolurl": "https://github.com/fuzztruction/fuzztruction",
    "title": "Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL++"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-bars.pdf"
    ]
  },
  {
    "name": "Fuzztruction-Net",
    "year": "2024",
    "targets": [
      "Network"
    ],
    "color": "greybox",
    "references": [
      "Fuzztruction"
    ],
    "author": [
      "Nils Bars",
      "Moritz Schloegel",
      "Nico Schiller",
      "Lukas Bernhard"
    ],
    "toolurl": "https://github.com/fuzztruction/fuzztruction-net",
    "title": "No Peer, no Cry: Network Application Fuzzing via Fault Injection",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security"
  },
  {
    "name": "Fuzzware",
    "year": "2022",
    "targets": [
      "Firmware"
    ],
    "color": "whitebox",
    "author": [
      "Tobias Scharnowski",
      "Nils Bars",
      "Moritz Schloegel",
      "Eric Gustafson",
      "Marius Muench",
      "Giovanni Vigna",
      "Christopher Kruegel",
      "Thorsten Holz",
      "Ali Abbasi"
    ],
    "toolurl": "https://github.com/fuzzware-fuzzer/fuzzware",
    "title": "Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-scharnowski.pdf"
    ]
  },
  {
    "name": "GLADE",
    "year": 2015,
    "author": [
      "Osbert Bastani",
      "Rahul Sharma",
      "Alex Aiken",
      "Percy Liang"
    ],
    "title": "Synthesizing Program Input Grammars",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "toolurl": "https://github.com/obastani/glade",
    "miscurl": [
      "https://obastani.github.io/docs/pldi17.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "CSmith",
      "LangFuzz"
    ],
    "color": "blackbox"
  },
  {
    "name": "GLeeFuzz",
    "year": 2023,
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "author": [
      "Hui Peng",
      "Zhihao Yao",
      "Ardalan Amiri Sani",
      "Dave (Jing) Tian",
      "Mathias Payer"
    ],
    "toolurl": "https://github.com/HexHive/GLeeFuzz",
    "title": "GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Favocado"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-peng.pdf"
    ]
  },
  {
    "name": "GPF",
    "year": 2005,
    "author": [
      "Jared Demott"
    ],
    "toolurl": "https://www.ee.oulu.fi/roles/ouspg/GPF",
    "targets": [
      "File",
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "GRIFFIN",
    "year": 2022,
    "targets": [
      "DBMS"
    ],
    "toolurl": "https://github.com/Griffin-2022/Griffin",
    "color": "greybox",
    "author": [
      "Jingzhou Fu",
      "Jie Liang",
      "Zhiyong Wu",
      "Mingzhe Wang",
      "Yu Jiang"
    ],
    "title": "GRIFFIN: Grammar-Free DBMS Fuzzing",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "references": [
      "AFL++"
    ],
    "miscurl": [
      "http://www.wingtecher.com/themes/WingTecherResearch/assets/papers/ASE22-Griffin.pdf"
    ]
  },
  {
    "name": "GRR",
    "year": 2016,
    "author": [
      "Peter Goodman"
    ],
    "toolurl": "https://github.com/trailofbits/grr",
    "targets": [
      "File"
    ],
    "references": [
      "radamsa"
    ],
    "miscurl": [
      "https://ieeexplore.ieee.org/document/8328981"
    ],
    "color": "greybox"
  },
  {
    "name": "GRT",
    "year": 2015,
    "author": [
      "Lei Ma",
      "Cyrille Artho",
      "Cheng Zhang",
      "Hiroyuki Sato",
      "Johannes Gmeiner",
      "Rudolf Ramler"
    ],
    "title": "GRT: Program-Analysis-Guided Random Testing",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://ieeexplore.ieee.org/abstract/document/7372010"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "GraphFuzz",
    "year": 2022,
    "targets": [
      "API"
    ],
    "color": "greybox",
    "author": [
      "Harrison Green",
      "Thanassis Avgerinos"
    ],
    "toolurl": "https://github.com/ForAllSecure/GraphFuzz",
    "title": "GraphFuzz: Library API Fuzzing with Lifetime-aware Dataflow Graphs",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "LibFuzzer"
    ],
    "miscurl": [
      "https://hgarrereyn.github.io/GraphFuzz/research/GraphFuzz_ICSE_2022.pdf"
    ]
  },
  {
    "name": "GreyOne",
    "year": 2020,
    "author": [
      "Shuitao Gan",
      "Chao Zhang",
      "Peng Chen",
      "Bodong Zhao",
      "Xiaojun Qin",
      "Dong Wu",
      "Zuoning Chen"
    ],
    "title": "GREYONE: Data Flow Sensitive Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20spring_gan_prepub.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "VUzzer",
      "Redqueen"
    ],
    "color": "greybox"
  },
  {
    "name": "Grimoire",
    "year": 2019,
    "author": [
      "Tim Blazytko",
      "Cornelius Aschermann",
      "Moritz Schlögel",
      "Ali Abbasi",
      "Sergej Schumilo",
      "Simon Wörner",
      "Thorsten Holz"
    ],
    "title": "GRIMOIRE: Synthesizing Structure while Fuzzing",
    "booktitle": "Proceedings of the USENIX Annual Technical Conference",
    "miscurl": [
      "https://www.usenix.org/system/files/sec19-blazytko.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "Redqueen"
    ],
    "color": "greybox"
  },
  {
    "name": "GzFuzz",
    "year": "2025",
    "targets": [
      "Robotic Simulator"
    ],
    "color": "greybox",
    "references": [
      "AFL++"
    ],
    "author": [
      "Zhilei Ren",
      "Yitao Li",
      "Xiaochen Li",
      "Guanxiao Qi",
      "Jifeng Xuan",
      "He Jiang"
    ],
    "toolurl": "https://github.com/liyitao-code/GzFuzz",
    "title": "Reinforcement Learning-based Fuzz Testing for the Gazebo Robotic Simulator",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "miscurl": [
      "https://dl.acm.org/doi/10.1145/3728942"
    ],
    "keywords": [
      "Reinforcement Learning"
    ]
  },
  {
    "name": "HFL",
    "year": 2020,
    "author": [
      "Kyungtae Kim",
      "Dae R. Jeong",
      "Chung Hwan Kim",
      "Yeongjin Jang",
      "Insik Shin",
      "Byoungyoung Lee"
    ],
    "title": "HFL: Hybrid Fuzzing on the Linux Kernel",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "targets": [
      "Kernel"
    ],
    "references": [
      "syzkaller"
    ],
    "color": "greybox"
  },
  {
    "name": "HFuzz",
    "year": "2023",
    "targets": [
      "Heterogeneous applications"
    ],
    "color": "greybox",
    "references": [
      "HeteroFuzz"
    ],
    "author": [
      "Jiyuan Wang",
      "Qian Zhang",
      "Hongbo Rong",
      "Guoqing Harry Xu",
      "Miryung Kim"
    ],
    "toolurl": "https://github.com/wjy99-c/HFuzz",
    "title": "Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://web.cs.ucla.edu/~wangjiyuan/research/FSE2023_HFuzz.pdf"
    ]
  },
  {
    "name": "HTFuzz",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Yuanping Yu",
      "Xiangkun Jia",
      "Yuwei Liu",
      "Yanhao Wang",
      "Qian Sang",
      "Chao Zhang",
      "Purui Su"
    ],
    "toolurl": "https://github.com/sharedata21/HTFuzz",
    "title": "HTFuzz: Heap Operation Sequence Sensitive Fuzzing",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "references": [
      "AFL",
      "MOPT"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3551349.3560415"
    ]
  },
  {
    "name": "HYPER-CUBE",
    "year": 2020,
    "author": [
      "Sergej Schumilo",
      "Cornelius Aschermann",
      "Ali Abbasi",
      "Simon Wörner",
      "Thorsten Holz"
    ],
    "title": "HYPER-CUBE: High-Dimensional Hypervisor Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "targets": [
      "Hypervisor"
    ],
    "references": [
      "CHIPSEC"
    ],
    "color": "greybox"
  },
  {
    "name": "Halo",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFLGo"
    ],
    "author": [
      "Heqing Huang",
      "Anshunkang Zhou",
      "Mathias Payer",
      "Charles Zhang"
    ],
    "title": "Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2024/313000a142/1Ub23ZRRhRu"
    ],
    "keywords": [
      "directed fuzzing"
    ]
  },
  {
    "name": "Harvey",
    "year": 2020,
    "author": [
      "Valentin Wüstholz",
      "Maria Christakis"
    ],
    "title": "Targeted Greybox Fuzzing with Static Lookahead Analysis",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "EVM"
    ],
    "references": [
      "AFLGo",
      "ContractFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "Hawkeye",
    "year": 2018,
    "author": [
      "Hongxu Chen",
      "Yinxing Xue",
      "Yuekang Li",
      "Bihuan Chen",
      "Xiaofei Zie",
      "Xiuheng Wu",
      "Yang Liu"
    ],
    "title": "Hawkeye: Towards a Desired Directed Grey-box Fuzzer",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "targets": [
      "File"
    ],
    "references": [
      "AFLGo"
    ],
    "color": "greybox"
  },
  {
    "name": "HeteroFuzz",
    "year": 2021,
    "author": [
      "Qian Zhang",
      "Jiyuan Wang",
      "Miryung Kim"
    ],
    "title": "HeteroFuzz: Fuzz Testing to Detect Platform Dependent Divergence for Heterogeneous Applications",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://web.cs.ucla.edu/~wangjiyuan/research/FSE2021_heterofuzz.pdf"
    ],
    "targets": [
      "Heterogeneous applications"
    ],
    "color": "greybox"
  },
  {
    "name": "HiCOND",
    "year": 2019,
    "author": [
      "Junjie Chen",
      "Guangcheng Wang",
      "Dan Ha",
      "Yingfei Xiong",
      "Hongyu Zhang",
      "Lu Zhang"
    ],
    "title": "History-Guided Configuration Diversification for Compiler Test-Program Generation",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/JunjieChen/HiCOND",
    "miscurl": [
      "https://xiongyingfei.github.io/papers/ASE19b.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "CSmith"
    ],
    "color": "blackbox"
  },
  {
    "name": "Hodor",
    "year": 2016,
    "author": [
      "Braden Hollembaek"
    ],
    "toolurl": "https://github.com/nccgroup/Hodor",
    "targets": [
      "File",
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "Hoedur",
    "year": "2023",
    "targets": [
      "Firmware"
    ],
    "color": "greybox",
    "author": [
      "Tobias Scharnowski",
      "Simon Wörner",
      "Felix Buchmann",
      "Nils Bars"
    ],
    "toolurl": "https://github.com/fuzzware-fuzzer/hoedur",
    "title": "Hoedur: Embedded Firmware Fuzzing using Multi-Stream Inputs",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "LibFuzzer"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-scharnowski.pdf"
    ]
  },
  {
    "name": "Hopper",
    "year": "2023",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "references": [
      "RESTler"
    ],
    "author": [
      "Peng Chen",
      "Yuxuan Xie",
      "Yunlong Lyu",
      "Yuxiao Wang",
      "Hao Chen"
    ],
    "toolurl": "https://github.com/FuzzAnything/Hopper",
    "title": "Hopper: Interpretative Fuzzing for Libraries",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3576915.3616610"
    ]
  },
  {
    "name": "HotFuzz",
    "year": 2020,
    "author": [
      "William Blair",
      "Andrea Mambretti",
      "Sajjad Arshad",
      "Michael Weissbacher",
      "William Robertson",
      "Engin Kirda",
      "Manuel Egele"
    ],
    "title": "HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://arxiv.org/pdf/2002.03416.pdf",
    "targets": [
      "API"
    ],
    "references": [
      "SlowFuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "Householder",
    "year": 2012,
    "title": "Probability-Based Parameter Selection for Black-Box Fuzz Testing",
    "author": [
      "Allen D. Householder",
      "Jonathan M. Foote"
    ],
    "miscurl": [
      "https://resources.sei.cmu.edu/asset_files/TechnicalNote/2012_004_001_28152.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "BFF"
    ],
    "color": "blackbox"
  },
  {
    "name": "HubFuzzer",
    "year": "2023",
    "targets": [
      "IoT"
    ],
    "color": "blackbox",
    "author": [
      "Xiaoyue Ma",
      "Qiang Zeng",
      "Haotian Chi",
      "Lannan Luo"
    ],
    "toolurl": "https://github.com/iot-sec23/HubFuzzer",
    "title": "No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware",
    "booktitle": "Proceedings of the International Conference on Mobile Systems, Applications, and Services",
    "references": [
      "Snipuzz"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3581791.3596857"
    ]
  },
  {
    "name": "HyDiff",
    "year": 2020,
    "author": [
      "Yannic Noller",
      "Corina S. Păsăreanu",
      "Marcel Böhme",
      "Youcheng Sun",
      "Hoang Lam Nguyen",
      "Lars Grunske"
    ],
    "title": "HyDiff: Hybrid Differential Software Analysis",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "Side-channel"
    ],
    "toolurl": "https://github.com/yannicnoller/hydiff",
    "references": [
      "DifFuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "HyPFuzz",
    "year": "2023",
    "targets": [
      "CPU"
    ],
    "color": "greybox",
    "author": [
      "Chen Chen",
      "Rahul Kande",
      "Nathan Nguyen",
      "Flemming Andersen",
      "Aakash Tyagi",
      "Ahmad-Reza Sadeghi",
      "Jeyavijayan Rajendran"
    ],
    "title": "HyPFuzz: Formal-Assisted Processor Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "TheHuzz"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-chen-chen.pdf"
    ]
  },
  {
    "name": "HyperFuzzer",
    "year": 2021,
    "author": [
      "Xinyang Ge",
      "Ben Niu",
      "Rober Brotzman",
      "Yaohui Chen",
      "HyungSeok Han",
      "Patrice Godefroid",
      "Weidong Cui"
    ],
    "title": "HyperFuzzer: An Efficient Hybrid Fuzzer for Virtual CPUs",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "targets": [
      "Hypervisor"
    ],
    "references": [
      "AFL",
      "SAGE"
    ],
    "color": "whitebox"
  },
  {
    "name": "HyperPill",
    "year": "2024",
    "targets": [
      "Hypervisor"
    ],
    "color": "greybox",
    "author": [
      "Alexander Bulekov",
      "Qiang Liu",
      "Manuel Egele",
      "Mathias Payer"
    ],
    "toolurl": "https://github.com/HexHive/HyperPill",
    "title": "HyperPill: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Morphuzz",
      "AFL++"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-bulekov.pdf"
    ]
  },
  {
    "name": "ICSFuzz",
    "year": 2021,
    "author": [
      "Dimitrios Tychalas",
      "Hadjer Benkraouda",
      "Michail Maniatakos"
    ],
    "title": "ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec21fall-tychalas.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "RVFuzzer",
      "FIRM-AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "ICSQuartz",
    "year": "2025",
    "targets": [
      "ICS"
    ],
    "color": "greybox",
    "references": [
      "ICSFuzz"
    ],
    "author": [
      "Corban Villa",
      "Constantine Doumanidis",
      "Hithem Lamri",
      "Prashant Hari Narayan Rajput",
      "Michail Maniatakos"
    ],
    "toolurl": "https://github.com/momalab/ICSQuartz",
    "title": "ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.240795"
    ],
    "keywords": [
      "plc",
      "scan cycle"
    ]
  },
  {
    "name": "IFIZZ",
    "year": 2021,
    "author": [
      "Penghui Li",
      "Yinxi Liu",
      "Wei Meng"
    ],
    "title": "IFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/decentL/iFIZZ-ASE21",
    "miscurl": [
      "https://nesa.zju.edu.cn/download/liu_pdf_ifizz.pdf"
    ],
    "targets": [
      "IoT"
    ],
    "references": [
      "FIFUZZ",
      "T-Fuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "IFuzzer",
    "year": 2016,
    "author": [
      "Spandan Veggalam",
      "Sanjay Rawat",
      "Istvan Haller",
      "Herbert Bos"
    ],
    "title": "IFuzzer: An Evolutionary Interpreter Fuzzer Using Genetic Programming",
    "booktitle": "Proceedings of the European Symposium on Research in Computer Security",
    "toolurl": "https://github.com/vspandan/IFuzzer",
    "targets": [
      "JavaScript"
    ],
    "references": [
      "LangFuzz"
    ],
    "color": "blackbox",
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "ILF",
    "year": 2019,
    "author": [
      "Jingxuan He",
      "Mislav Balunović",
      "Nodar Ambroladze",
      "Petar Tsankov",
      "Martin Vechev"
    ],
    "title": "Learning to Fuzz from Symbolic Execution with Application to Smart Contracts",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://files.sri.inf.ethz.ch/website/papers/ccs19-ilf.pdf"
    ],
    "toolurl": "https://github.com/eth-sri/ilf",
    "targets": [
      "EVM"
    ],
    "references": [
      "Neuzz",
      "ContractFuzzer",
      "Learn&Fuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "IMF",
    "year": 2017,
    "author": [
      "HyungSeok Han",
      "Sang Kil Cha"
    ],
    "title": "IMF: Inferred Model-based Fuzzer",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "toolurl": "https://github.com/SoftSec-KAIST/IMF",
    "miscurl": [
      "https://daramg.gift/paper/han-ccs2017.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "references": [
      "syzkaller"
    ],
    "color": "blackbox"
  },
  {
    "name": "IPEA-Fuzz",
    "year": "2024",
    "targets": [
      "Firmware"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Jiameng Shi",
      "Wenqiang Li",
      "Wenwen Wang",
      "Le Guan"
    ],
    "toolurl": "https://github.com/MCUSec/IPEA",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2024-116-paper.pdf"
    ],
    "title": "Facilitating Non-Intrusive In-Vivo Firmware Testing with Stateless Instrumentation",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium"
  },
  {
    "name": "IRFuzzer",
    "year": "2025",
    "targets": [
      "Compiler"
    ],
    "color": "blackbox",
    "references": [
      "CSmith"
    ],
    "author": [
      "Yuyang Rong",
      "Zhanghan Yu",
      "Zhenkai Weng",
      "Stephen Neuendorffer",
      "Hao Chen"
    ],
    "title": "IRFuzzer: Specialized Fuzzing for LLVM Backend Code Generation",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://arxiv.org/abs/2402.05256"
    ],
    "keywords": [
      "compiler backend",
      "IR mutation"
    ]
  },
  {
    "name": "InputBlaster",
    "year": "2024",
    "targets": [
      "mobile app"
    ],
    "color": "blackbox",
    "references": [
      "APE"
    ],
    "author": [
      "Zhe Liu",
      "Chunyang Chen",
      "Junjie Wang",
      "Mengzhuo Chen",
      "Boyu Wu",
      "Zhilin Tian",
      "Yuekai Huang",
      "Jun Hu",
      "Qing Wang"
    ],
    "title": "Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language Model",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://arxiv.org/pdf/2310.15657"
    ],
    "keywords": [
      "app"
    ]
  },
  {
    "name": "Intender",
    "year": "2023",
    "targets": [
      "Network"
    ],
    "color": "blackbox",
    "references": [
      "DELTA"
    ],
    "author": [
      "Jiwon Kim",
      "Benjamin E. Ujcich",
      "Dave (Jing) Tian"
    ],
    "toolurl": "https://github.com/purseclab/intender",
    "title": "Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-kim-jiwon.pdf"
    ],
    "keywords": [
      "Intent-based networking"
    ]
  },
  {
    "name": "Intriguer",
    "year": 2019,
    "author": [
      "Mingi Cho",
      "Seoyoung Kim",
      "Taekyoung Kwon"
    ],
    "title": "Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "toolurl": "Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing",
    "miscurl": [
      "https://wcventure.github.io/FuzzingPaper/Paper/CCS19_Intriguer.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL",
      "QSYM"
    ],
    "color": "whitebox"
  },
  {
    "name": "Invivo",
    "year": "2025",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "references": [
      "AFL++"
    ],
    "author": [
      "Octavio Galland",
      "Marcel Böhme"
    ],
    "toolurl": "https://github.com/OctavioGalland/afllive",
    "title": "Invivo Fuzzing by Amplifying Actual Executions",
    "booktitle": "Proceedings of the 46th IEEE/ACM International Conference on Software Engineering (ICSE)",
    "miscurl": [
      "https://ieeexplore.ieee.org/document/11029862"
    ],
    "keywords": [
      "function-level fuzzing",
      "constraint-aware fuzzing"
    ]
  },
  {
    "name": "IoTFuzzer",
    "year": 2018,
    "author": [
      "Jiongyi Chen",
      "Wenrui Diao",
      "Qingchuan Zhao",
      "Chaoshun Zuo",
      "Zhiqiang Lin",
      "XiaoFeng Wang",
      "Wing Cheong Lau",
      "Menghan Sun",
      "Ronghai Yang",
      "Kehuan Zhang"
    ],
    "title": "IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://staff.ie.cuhk.edu.hk/~khzhang/my-papers/2018-ndss-iot.pdf"
    ],
    "targets": [
      "IoT"
    ],
    "references": [
      "BitFuzz",
      "TaintScope"
    ],
    "color": "blackbox"
  },
  {
    "name": "ItyFuzz",
    "year": "2023",
    "targets": [
      "Smart Contract"
    ],
    "color": "greybox",
    "references": [
      "SMARTIAN"
    ],
    "author": [
      "Chaofan Shou",
      "Shangyin Tan",
      "Koushik Sen"
    ],
    "toolurl": "https://github.com/fuzzland/ityfuzz",
    "title": "ItyFuzz: Snapshot-Based Fuzzer for Smart Contract",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "miscurl": [
      "https://dl.acm.org/doi/10.1145/3597926.3598059"
    ]
  },
  {
    "name": "IvySyn",
    "year": "2023",
    "targets": [
      "API"
    ],
    "color": "blackbox",
    "references": [
      "FreeFuzz"
    ],
    "author": [
      "Neophytos Christou",
      "Di Jin",
      "Vaggelis Atlidakis",
      "Baishakhi Ray",
      "Vasileios P. Kemerlis"
    ],
    "toolurl": "https://gitlab.com/brown-ssl/ivysyn",
    "title": "IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-christou.pdf"
    ]
  },
  {
    "name": "JIGSAW",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "whitebox",
    "author": [
      "Ju Chen",
      "Jinghan Wang",
      "Chengyu Song",
      "Heng Yin"
    ],
    "toolurl": "https://github.com/R-Fuzz/jigsaw",
    "title": "JIGSAW: Efficient and Scalable Path Constraints Fuzzing",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "references": [
      "Angora"
    ],
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2022/131600b531/1CIO7Am84aA"
    ]
  },
  {
    "name": "JITfuzz",
    "year": "2023",
    "targets": [
      "Compiler"
    ],
    "color": "greybox",
    "author": [
      "Mingyuan Wu",
      "Minghai Lu",
      "Heming Cui",
      "Junjie Chen"
    ],
    "toolurl": "https://github.com/lochnagarr/JITFuzz",
    "title": "JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "AFL++"
    ],
    "miscurl": [
      "https://lingming.cs.illinois.edu/publications/icse2023e.pdf"
    ],
    "keywords": [
      "JVM",
      "JIT compilers"
    ]
  },
  {
    "name": "JOpFuzzer",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Haoxiang Jia",
      "Ming Wen",
      "Zifan Xie",
      "Xiaochen Guo",
      "Rongxin Wu",
      "Maolin Sun",
      "Kang Chen",
      "Hai Jin"
    ],
    "title": "Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "classming"
    ],
    "miscurl": [
      "https://justinwm.github.io/paper/ICSE-JOpFuzzer-Checked.pdf"
    ],
    "keywords": [
      "JVM",
      "JIT compiler"
    ]
  },
  {
    "name": "JQF",
    "year": 2019,
    "author": [
      "Rohan Padhye",
      "Caroline Lemieux",
      "Koushik Sen"
    ],
    "title": "JQF: Coverage-Guided Property-Based Testing in Java",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "toolurl": "https://github.com/rohanpadhye/JQF",
    "miscurl": [
      "https://people.eecs.berkeley.edu/~rohanpadhye/files/jqf-issta19.pdf"
    ],
    "targets": [
      "Java"
    ],
    "references": [
      "Kelinci"
    ],
    "color": "greybox"
  },
  {
    "name": "JSGo",
    "year": "2024",
    "targets": [
      "Application"
    ],
    "color": "greybox",
    "author": [
      "Changhua Luo",
      "Penghui Li",
      "Wei Meng",
      "Chao Zhang"
    ],
    "title": "Test Suites Guided Vulnerability Validation for Node.js Applications",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3658644.3690332"
    ],
    "references": [
      "Witcher",
      "RESTler",
      "MINER"
    ],
    "keywords": [
      "node js"
    ]
  },
  {
    "name": "Janus",
    "year": 2019,
    "author": [
      "Wen xu",
      "Hyungon Moon",
      "Sanidhya Kashyap",
      "Po-Ning Tseng",
      "Taesoo Kim"
    ],
    "title": "Fuzzing File Systems via Two-Dimensional Input Space Exploration",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "targets": [
      "Kernel"
    ],
    "miscurl": [
      "https://taesoo.kim/pubs/2019/xu:janus.pdf"
    ],
    "references": [
      "fsfuzzer",
      "kAFL"
    ],
    "color": "greybox"
  },
  {
    "name": "Jetris",
    "year": "2024",
    "targets": [
      "JVM"
    ],
    "color": "greybox",
    "author": [
      "Yingquan Zhao",
      "Zan Wang",
      "Junjie Chen",
      "Ruifeng Fu",
      "Yanzhou Lu",
      "Tianchang Gao",
      "Haojie Ye"
    ],
    "title": "Program Ingredients Abstraction and Instantiation for Synthesis-based JVM Testing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3658644.3690366"
    ],
    "references": [
      "classming"
    ],
    "keywords": [
      "JVM"
    ]
  },
  {
    "name": "Jit-Picker",
    "year": 2022,
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "author": [
      "Lukas Bernhard",
      "Tobias Scharnowski",
      "Moritz Schloegel",
      "Tim Blazytko",
      "Thorsten Holz"
    ],
    "title": "Jit-Picking: Differential Fuzzing of JavaScript Engines",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "references": [
      "Fuzzilli"
    ],
    "miscurl": [
      "https://publications.cispa.saarland/3773/1/2022-CCS-JIT-Fuzzing.pdf"
    ]
  },
  {
    "name": "K-Scheduler",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Dongdong She",
      "Abhishek Shah",
      "Suman Jana"
    ],
    "toolurl": "https://github.com/Dongdongshe/K-Scheduler",
    "title": "Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2022/131600b558/1CIO87fBXK8"
    ]
  },
  {
    "name": "KLEE",
    "year": 2008,
    "author": [
      "Cristian Cadar",
      "Daniel Dunbar",
      "Dawson Engler"
    ],
    "title": "KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs",
    "booktitle": "Proceedings of the USENIX Symposium on Operating System Design and Implementation",
    "toolurl": "https://klee.github.io/",
    "targets": [
      "Argument",
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "KRAKEN",
    "year": "2025",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Anshunkang Zhou",
      "Heqing Huang",
      "Charles Zhang"
    ],
    "toolurl": "https://github.com/seviezhou/Kraken",
    "title": "KRAKEN: Program-Adaptive Parallel Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Software Testing and Analysis",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3728882"
    ],
    "keywords": [
      "Parallel Fuzzer"
    ]
  },
  {
    "name": "KameleonFuzz",
    "year": 2014,
    "author": [
      "Fabien Duchene",
      "Sanjay Rawat",
      "Jean-Luc Richier",
      "Roland Groz"
    ],
    "title": "KameleonFuzz: Evolutionary Fuzzing for Black-box XSS Detection",
    "booktitle": "Proceedings of the ACM Conference on Data and Application Security and Privacy",
    "miscurl": [
      "https://dl.acm.org/citation.cfm?id=2557550"
    ],
    "references": [
      "Doupé et al."
    ],
    "targets": [
      "Network"
    ],
    "color": "blackbox"
  },
  {
    "name": "Kelinci",
    "year": 2018,
    "author": [
      "Rody Kersten"
    ],
    "references": [
      "AFL"
    ],
    "toolurl": "https://github.com/isstac/kelinci",
    "targets": [
      "Java"
    ],
    "color": "greybox"
  },
  {
    "name": "KernelFuzzer",
    "year": 2016,
    "author": [
      "James Loureiro",
      "Georgi Geshev"
    ],
    "title": "Platform Agnostic Kernel Fuzzing",
    "booktitle": "Proceedings of DefCon",
    "toolurl": "https://github.com/FSecureLABS/KernelFuzzer",
    "miscurl": [
      "https://labs.f-secure.com/assets/BlogFiles/mwri-Platform-Agnostic-Kernel-Fuzzing-FINAL.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "color": "blackbox"
  },
  {
    "name": "KextFuzz",
    "year": "2023",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "references": [
      "syzkaller"
    ],
    "author": [
      "Tingting Yin",
      "Zicong Gao",
      "Zhenghang Xiao",
      "Zheyu Ma",
      "Min Zheng",
      "Chao Zhang"
    ],
    "toolurl": "https://github.com/vul337/KextFuzz",
    "title": "KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec23fall-prepub-425-yin-tingting.pdf"
    ]
  },
  {
    "name": "KiF",
    "year": 2007,
    "author": [
      "Humberto J. Abdelnur",
      "Radu State",
      "Olivier Festor"
    ],
    "title": "KiF: A Stateful SIP Fuzzer",
    "booktitle": "Proceedings of the International Conference on Principles",
    "miscurl": [
      "https://hal.inria.fr/inria-00166947/document"
    ],
    "targets": [
      "Network"
    ],
    "references": [
      "SNOOZE"
    ],
    "color": "blackbox"
  },
  {
    "name": "Kitty",
    "year": 2016,
    "author": [
      "Binyamin Sharet"
    ],
    "title": "Hello Kitty",
    "booktitle": "Proceedings of BSides Knoxville",
    "toolurl": "https://github.com/cisco-sas/kitty",
    "miscurl": [
      "https://www.youtube.com/watch?v=EKqqQbxZmA4"
    ],
    "targets": [
      "Network"
    ],
    "references": [
      "Peach",
      "Sulley"
    ],
    "color": "blackbox"
  },
  {
    "name": "Krace",
    "year": 2020,
    "author": [
      "Meng Xu",
      "Sanidhya Kashyap",
      "Hanqing Zhao",
      "Taesoo Kim"
    ],
    "title": "KRACE: Data Race Fuzzing for Kernel File Systems",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "targets": [
      "Kernel"
    ],
    "references": [
      "Razzer"
    ],
    "color": "greybox"
  },
  {
    "name": "LABRADOR",
    "year": "2024",
    "targets": [
      "IoT"
    ],
    "color": "blackbox",
    "references": [
      "Snipuzz",
      "FIRM-AFL"
    ],
    "author": [
      "Hangtian Liu",
      "Shuitao Gan",
      "Chao Zhang",
      "Zicong Gao",
      "Hongqi Zhang",
      "Xiangzhi Wang",
      "Guangming Gao"
    ],
    "title": "LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2024/313000a127/1Ub23HQTJ1C"
    ],
    "keywords": [
      "IoT",
      "Response Guided",
      "Directed Fuzzing"
    ]
  },
  {
    "name": "LL-fuzzer",
    "year": 2015,
    "author": [
      "Chad Spensky"
    ],
    "toolurl": "https://github.com/mit-ll/LL-Fuzzer",
    "targets": [
      "Network"
    ],
    "references": [
      "Sulley"
    ],
    "color": "blackbox"
  },
  {
    "name": "LLM-Fuzzer",
    "year": "2024",
    "targets": [
      "LLM"
    ],
    "color": "blackbox",
    "author": [
      "Jiahao Yu",
      "Xingwei Lin",
      "Zheng Yu",
      "Xinyu Xing"
    ],
    "toolurl": "https://github.com/sherdencooper/GPTFuzz",
    "title": "LLM-Fuzzer: Scaling Assessment of Large Language Model Jailbreaks",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-yu-jiahao.pdf"
    ]
  },
  {
    "name": "LLMIF",
    "year": "2024",
    "targets": [
      "IoT"
    ],
    "color": "greybox",
    "references": [
      "ChatAFL"
    ],
    "author": [
      "Jincheng Wang",
      "Le Yu",
      "Xiapu Luo"
    ],
    "title": "LLMIF: Augmented Large Language Model for Fuzzing IoT Devices",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2024/313000a196/1WPcYnhN15u"
    ],
    "keywords": [
      "IoT",
      "LLM"
    ]
  },
  {
    "name": "LOKI",
    "year": "2023",
    "targets": [
      "Blockchain"
    ],
    "color": "greybox",
    "author": [
      "Fuchen Ma",
      "Yuanliang Chen,Meng Ren",
      "Yuanhang Zhou",
      "Yu Jiang",
      "Ting Chen",
      "Huizhong Li",
      "Jiaguang Sun"
    ],
    "toolurl": "https://github.com/ConsensusFuzz/LOKI",
    "title": "LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f78_paper.pdf"
    ],
    "references": [
      "Fluffy"
    ]
  },
  {
    "name": "LTEFuzz",
    "year": 2019,
    "author": [
      "Hongil Kim",
      "Jiho Lee",
      "Eunkyu Lee",
      "Yongdae Kim"
    ],
    "title": "Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "targets": [
      "LTE"
    ],
    "references": [
      "PROTOS"
    ],
    "color": "blackbox"
  },
  {
    "name": "LTL-Fuzzer",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Ruijie Meng",
      "Zhen Dong",
      "Jialin Li",
      "Ivan Beschastnikh",
      "Abhik Roychoudhury"
    ],
    "toolurl": "https://github.com/ltlfuzzer/LTL-Fuzzer",
    "title": "Linear-time Temporal Logic guided Greybox Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "AFL",
      "AFLGo"
    ],
    "miscurl": [
      "https://arxiv.org/pdf/2109.02312.pdf"
    ]
  },
  {
    "name": "LZfuzz",
    "year": 2008,
    "author": [
      "Sergey Bratus",
      "Axel Hansen",
      "Anna Shubina"
    ],
    "title": "LZfuzz: a fast compression-based fuzzer for poorlydocumented protocols",
    "targets": [
      "File"
    ],
    "references": [
      "Sulley"
    ],
    "color": "blackbox"
  },
  {
    "name": "LangFuzz",
    "year": 2012,
    "author": [
      "Christian Holler",
      "Kim Herzig",
      "Andreas Zeller"
    ],
    "title": "Fuzzing with Code Fragments",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final73.pdf"
    ],
    "targets": [
      "JavaScript"
    ],
    "references": [
      "cross_fuzz",
      "jsfunfuzz"
    ],
    "color": "blackbox",
    "keywords": [
      "JavaScript"
    ]
  },
  {
    "name": "Learn&Fuzz",
    "year": 2017,
    "author": [
      "Patrice Godefroid",
      "Hila Peleg",
      "Rishabh Singh"
    ],
    "title": "Learn&Fuzz: Machine Learning for Input Fuzzing",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "targets": [
      "File"
    ],
    "references": [
      "SAGE"
    ],
    "color": "greybox"
  },
  {
    "name": "LibAFL",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Andrea Fioraldi",
      "Dominik Maier",
      "Dongjia Zhang",
      "Davide Balzarotti"
    ],
    "toolurl": "https://github.com/AFLplusplus/LibAFL",
    "title": "LibAFL: A Framework to Build Modular and Reusable Fuzzers",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "references": [
      "AFL++"
    ],
    "miscurl": [
      "https://www.s3.eurecom.fr/docs/ccs22_fioraldi.pdf"
    ]
  },
  {
    "name": "LibFuzzer",
    "author": [],
    "year": 2015,
    "toolurl": "http://llvm.org/docs/LibFuzzer.html",
    "references": [
      "AFL"
    ],
    "targets": [
      "Lib"
    ],
    "color": "greybox"
  },
  {
    "name": "Luo et al.",
    "year": 2021,
    "author": [
      "Weisi Luo",
      "Dong Chai",
      "Xiaoyue Run",
      "Jiang Wang",
      "Chunrong Fang",
      "Zhenyu Chen"
    ],
    "title": "Graph-based Fuzz Testing for Deep Learning Inference Engines",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "toolurl": "https://github.com/gbftdlie/Graph-based-fuzz-testing",
    "miscurl": [
      "https://arxiv.org/pdf/2008.05933.pdf"
    ],
    "references": [
      "TensorFuzz"
    ],
    "targets": [
      "DL inference engine"
    ],
    "color": "greybox"
  },
  {
    "name": "MALintent",
    "year": "2025",
    "targets": [
      "android"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Ammar Askar",
      "Fabian Fleischer",
      "Christopher Kruegel",
      "Giovanni Vigna",
      "Taesoo Kim"
    ],
    "toolurl": "https://github.com/sslab-gatech/MALintent",
    "title": "MALintent: Coverage Guided Intent Fuzzing Framework for Android",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.230125"
    ],
    "keywords": [
      "android",
      "intent fuzzing",
      "privacy violations",
      "JNI",
      "coverage-guided"
    ]
  },
  {
    "name": "MAU",
    "year": "2024",
    "targets": [
      "EVM"
    ],
    "color": "greybox",
    "author": [
      "Weimin Chen",
      "Xiapu Luo",
      "Haipeng Cai",
      "Haoyu Wang"
    ],
    "title": "Towards Smart Contract Fuzzing on GPU",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2024/313000a195/1WPcYmDLzKo"
    ]
  },
  {
    "name": "MC2",
    "year": "2022",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Abhishek Shah",
      "Dongdong She",
      "Samanway Sadhu",
      "Krish Singal",
      "Peter Coffman",
      "Suman Jana"
    ],
    "toolurl": "https://hub.docker.com/r/abhishekshah212/mc2",
    "title": "MC2: Rigorous and Efficient Directed Greybox Fuzzing",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "references": [
      "AFLGo",
      "ParmeSan"
    ],
    "miscurl": [
      "https://arxiv.org/pdf/2208.14530.pdf"
    ]
  },
  {
    "name": "MCFuzz",
    "year": 2019,
    "author": [
      "Chengyu Zhang",
      "Ting Su",
      "Yichen Yan",
      "Fuyuan Zhang",
      "Geguang Pu",
      "Zhendong Su"
    ],
    "title": "Finding and Understanding Bugs in Software Model Checkers",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://tingsu.github.io/files/fse19-MCFuzz.pdf"
    ],
    "targets": [
      "Model checker"
    ],
    "color": "greybox"
  },
  {
    "name": "MDPERFFUZZ",
    "year": 2021,
    "author": [
      "Penghui Li",
      "Yinxi Liu",
      "Wei Meng"
    ],
    "title": "Understanding and Detecting Performance Bugs in Markdown Compilers",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/cuhk-seclab/mdperffuzz",
    "miscurl": [
      "https://appsrv.cse.cuhk.edu.hk/~phli/paper/ase21_mdperffuzz.pdf"
    ],
    "targets": [
      "Markdown"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "MINER",
    "year": "2023",
    "targets": [
      "API"
    ],
    "color": "blackbox",
    "references": [
      "RESTler"
    ],
    "author": [
      "Chenyang Lyu",
      "Jiacheng Xu",
      "Shouling Ji",
      "Xuhong Zhang",
      "Qinying Wang",
      "Binbin Zhao",
      "Gaoning Pan",
      "Wei Cao",
      "Peng Chen",
      "Raheem Beyah"
    ],
    "toolurl": "https://github.com/puppet-meteor/MINER",
    "title": "MINER: A Hybrid Data-Driven Approach for REST API Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec23fall-prepub-129-lyu.pdf"
    ]
  },
  {
    "name": "MLIRSmith",
    "year": "2023",
    "targets": [
      "Compiler"
    ],
    "color": "blackbox",
    "references": [
      "CSmith"
    ],
    "author": [
      "Haoyu Wang",
      "Junjie Chen",
      "Chuyue Xie",
      "Shuang Liu",
      "Zan Wang",
      "Qingchao Shen",
      "Yingquan Zhao"
    ],
    "toolurl": "https://github.com/Colloportus0/MLIRSmith",
    "title": "MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "keywords": [
      "MLIR"
    ]
  },
  {
    "name": "MLIRTracer",
    "year": "2025",
    "targets": [
      "Compiler"
    ],
    "color": "greybox",
    "references": [
      "MLIRSmith"
    ],
    "author": [
      "Weiyuan Tong",
      "Zixu Wang",
      "Zhanyong Tang",
      "Jianbin Fang",
      "Yuqun Zhang",
      "Guixin Ye"
    ],
    "title": "Directed Testing in MLIR: Unleashing Its Potential by Overcoming the Limitations of Random Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://doi.org/10.1145/3729372"
    ],
    "keywords": [
      "Compiler Fuzzing",
      "MLIR"
    ]
  },
  {
    "name": "MOCK",
    "year": "2024",
    "targets": [
      "Kernel"
    ],
    "color": "greybox",
    "references": [
      "syzkaller"
    ],
    "author": [
      "Jiacheng Xu",
      "Xuhong Zhang",
      "Shouling Ji",
      "Yuan Tian",
      "Binbin Zhao",
      "Qinying Wang",
      "Peng Cheng",
      "Jiming Chen"
    ],
    "toolurl": "https://github.com/m0ck1ng/mock",
    "title": "MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2024-131-paper.pdf"
    ],
    "keywords": [
      "Kernel Fuzzing"
    ]
  },
  {
    "name": "MOPT",
    "year": 2019,
    "author": [
      "Chenyang Lyu",
      "Shouling Ji",
      "Chao Zhang",
      "Yuwei Li",
      "Wei-Han Lee",
      "Yu Song",
      "Raheem Beyah"
    ],
    "title": "MOPT: Optimized Mutation Scheduling for Fuzzers",
    "booktitle": "Proceedings of the USENIX Annual Technical Conference",
    "toolurl": "https://github.com/puppet-meteor/MOpt-AFL",
    "miscurl": [
      "https://www.usenix.org/system/files/sec19-lyu.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "MPFuzz",
    "year": "2024",
    "targets": [
      "Blockchain"
    ],
    "color": "greybox",
    "author": [
      "Yibo Wang",
      "Yuzhe Tang",
      "Kai Li",
      "Wanning Ding"
    ],
    "toolurl": "https://figshare.com/articles/software/MPFUZZ/26061169",
    "title": "Understanding Ethereum Mempool Security under Asymmetric DoS by Symbolized Stateful Fuzzing",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Fluffy",
      "LOKI"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-wang-yibo.pdf"
    ]
  },
  {
    "name": "MTFuzz",
    "year": 2020,
    "author": [
      "Dongdong She",
      "Rahul Krishna",
      "Lu Yan",
      "Suman Jana",
      "Baishakhi Ray"
    ],
    "title": "MTFuzz: Fuzzing with a Multi-task Neural Network",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "toolurl": "https://github.com/llvm/llvm-project/commit/e2e38fca64e49d684de0b100437fe2f227f8fcdd",
    "miscurl": [
      "https://arxiv.org/pdf/2005.12392.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "Neuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "MagicFuzzer",
    "year": 2012,
    "author": [
      "Yan Cai",
      "W.K. Chan"
    ],
    "title": "MagicFuzzer: Scalable Deadlock Detection for Large-Scale Applications",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "toolurl": "http://lcs.ios.ac.cn/~yancai/magicfuzzer/",
    "targets": [
      "Concurrency"
    ],
    "references": [
      "DeadlockFuzzer"
    ],
    "color": "greybox"
  },
  {
    "name": "Mahmood et al.",
    "year": 2012,
    "author": [
      "Riyadh Mahmood",
      "Naeem Esfahani",
      "Thabet Kacem",
      "Nariman Mirzaei",
      "Sam Malek",
      "Angelos Stavrou"
    ],
    "title": "A whitebox approach for automated security testing of android applications on the cloud",
    "booktitle": "Proceedings of the International Workshop on Automation of Software Test",
    "miscurl": [
      "https://ieeexplore.ieee.org/document/6228986"
    ],
    "references": [
      "SAGE"
    ],
    "targets": [
      "Lib"
    ],
    "color": "whitebox"
  },
  {
    "name": "Mallory",
    "year": "2023",
    "targets": [
      "Distributed System"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Ruijie Meng",
      "George Pîrlea",
      "Abhik Roychoudhury",
      "Ilya Sergey"
    ],
    "toolurl": "https://github.com/dsfuzz/mallory",
    "title": "Greybox Fuzzing of Distributed Systems",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3576915.3623097"
    ]
  },
  {
    "name": "Mamba",
    "year": 2012,
    "author": [
      "Roger Lee Seagle Jr."
    ],
    "title": "A Framework for File Format Fuzzing with Genetic Algorithms",
    "toolurl": "https://github.com/rogwfu/mamba",
    "targets": [
      "File"
    ],
    "references": [
      "EFS",
      "Sulley"
    ],
    "miscurl": [
      "http://trace.tennessee.edu/cgi/viewcontent.cgi?article=2402&context=utk_graddiss"
    ],
    "color": "greybox"
  },
  {
    "name": "Matryoshka",
    "year": 2019,
    "author": [
      "Peng Chen",
      "Jianzhong Liu",
      "Hao Chen"
    ],
    "title": "Matryoshka: Fuzzing Deeply Nested Branches",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://kms.shanghaitech.edu.cn/bitstream/2MSLDSTB/104875/1/10.1145%403319535.3363225.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "Angora",
      "SLF"
    ],
    "color": "greybox"
  },
  {
    "name": "Melkor",
    "year": 2014,
    "author": [
      "Alejandro Hernández"
    ],
    "toolurl": "https://github.com/IOActive/Melkor_ELF_Fuzzer",
    "miscurl": [
      "https://ioactive.com/wp-content/uploads/2018/05/IOActive_ELF_Parsing_with_Melkor-1.pdf"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "MemLock",
    "year": 2020,
    "author": [
      "Cheng Wen",
      "Haijun Wang",
      "Yuekang Li",
      "Shengchao Qin",
      "Yang Liu",
      "Zhiwu Xu",
      "Hongxu Chen",
      "Xiaofei Xie",
      "Geguang Pu",
      "Ting Liu"
    ],
    "title": "MemLock: Memory Usage Guided Fuzzing",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "targets": [
      "File"
    ],
    "references": [
      "SlowFuzz",
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "MendelFuzz",
    "year": "2025",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL++"
    ],
    "author": [
      "Han Zheng",
      "Flavio Toffalini",
      "Marcel Böhme",
      "Mathias Payer"
    ],
    "toolurl": "https://github.com/HexHive/MendelFuzz-Artifact",
    "title": "MendelFuzz: The Return of the Deterministic Stage",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://doi.org/10.1145/3715713"
    ]
  },
  {
    "name": "Metamong",
    "year": 2023,
    "targets": [
      "Web"
    ],
    "color": "blackbox",
    "author": [
      "Suhwan Song",
      "Byoungyoung Lee"
    ],
    "toolurl": "https://figshare.com/s/d3c228e614672f9aa811",
    "title": "Metamong: Detecting Render-Update Bugs in Web Browsers through Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "Domato"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3611643.3616336"
    ]
  },
  {
    "name": "Miller et al.",
    "year": 1990,
    "author": [
      "Barton P. Miller",
      "Louis Fredriksen",
      "Bryan So"
    ],
    "title": "An Empirical Study of the Reliability of UNIX Utilities",
    "journal": "Communications of the ACM",
    "volume": "33",
    "number": "12",
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "Minerva",
    "year": "2022",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "author": [
      "Chijin Zhou",
      "Quan Zhang",
      "Mingzhe Wang",
      "Lihua Guo",
      "Jie Liang",
      "Zhe Liu",
      "Mathias Payer",
      "Yu Jiang"
    ],
    "toolurl": "https://github.com/ChijinZ/Minerva",
    "title": "Minerva: Browser API Fuzzing with Dynamic Mod-Ref Analysis",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "Domato"
    ],
    "miscurl": [
      "https://nebelwelt.net/files/22FSE.pdf"
    ]
  },
  {
    "name": "Minifuzz",
    "year": 2011,
    "author": [
      "Jeremy Dallman",
      "Georgeo Pulikkathara"
    ],
    "miscurl": [
      "https://msdn.microsoft.com/en-us/biztalk/gg675011"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "MirageFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Mingyuan Wu",
      "Kunqiu Chen",
      "Qi Luo",
      "Jiahong Xiang",
      "Ji Qi",
      "Junjie Chen",
      "Heming Cui",
      "Yuqun Zhang"
    ],
    "toolurl": "https://github.com/WorldExecute/fuzzer",
    "title": "Enhancing Coverage-Guided Fuzzing via Phantom Program",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://shadowmydx.github.io/papers/fse2023a.pdf"
    ]
  },
  {
    "name": "MoFuzz",
    "year": 2020,
    "author": [
      "Hoang Lam Nguyen",
      "Nebras Nassar",
      "Timo Kehrer",
      "Lars Grunske"
    ],
    "title": "MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "toolurl": "https://github.com/hub-se/MoFuzz",
    "miscurl": [
      "https://doi.org/10.18420/SE2021_29",
      "https://github.com/rohanpadhye/jqf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "JQF"
    ],
    "color": "greybox"
  },
  {
    "name": "MoWF",
    "year": 2016,
    "author": [
      "Van-Thuan Pham",
      "Marcel Böhme",
      "Abhik Roychoudhury"
    ],
    "title": "Model-Based Whitebox Fuzzing for Program Binaries",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://thuanpv.github.io/publications/ASE16.pdf",
      "https://thuanpv.github.io/publications/MoWF_ASE2016.pdf"
    ],
    "references": [
      "Driller"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "MobFuzz",
    "year": 2022,
    "author": [
      "Gen Zhang",
      "Pengfei Wang",
      "Tai Yue",
      "Xiangdong Kong",
      "Shan Huang",
      "Xu Zhou",
      "Kai Lu"
    ],
    "title": "MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "targets": [
      "File"
    ],
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2022-314-paper.pdf"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "Moneta",
    "year": "2025",
    "targets": [
      "kernel"
    ],
    "color": "greybox",
    "references": [
      "syzkaller"
    ],
    "author": [
      "Joonkyo Jung",
      "Jisoo Jang",
      "Yongwan Jo",
      "Jonas Vinck",
      "Alexios Voulimeneas",
      "Stijn Volckaert",
      "Dokyung Song"
    ],
    "toolurl": "https://github.com/yonsei-sslab/moneta",
    "title": "Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.230218"
    ],
    "keywords": [
      "gpu",
      "driver"
    ]
  },
  {
    "name": "Montage",
    "year": 2020,
    "author": [
      "Suyoung Lee",
      "HyungSeok Han",
      "Sang Kil Cha",
      "Sooel Son"
    ],
    "title": "Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20summer_lee-suyoung_prepub_0.pdf"
    ],
    "targets": [
      "JavaScript"
    ],
    "references": [
      "CodeAlchemist"
    ],
    "color": "blackbox"
  },
  {
    "name": "MorFuzz",
    "year": "2023",
    "targets": [
      "CPU"
    ],
    "color": "greybox",
    "references": [
      "DifuzzRTL"
    ],
    "author": [
      "Jinyan Xu",
      "Yiyuan Liu",
      "Sirui He",
      "Haoran Lin",
      "Yajin Zhou",
      "Cong Wang"
    ],
    "toolurl": "https://github.com/sycuricon/MorFuzz",
    "title": "MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-xu-jinyan.pdf"
    ]
  },
  {
    "name": "Morphuzz",
    "year": 2022,
    "targets": [
      "Hypervisor"
    ],
    "color": "greybox",
    "author": [
      "Alexander Bulekov",
      "Bandan Das",
      "Stefan Hajnoczi",
      "Manuel Egele"
    ],
    "toolurl": "https://doi.org/10.5281/zenodo.5664344",
    "title": "Morphuzz: Bending (Input) Space to Fuzz Virtual Devices",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "LibFuzzer"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-bulekov.pdf"
    ]
  },
  {
    "name": "MultiFuzz",
    "year": "2024",
    "targets": [
      "Firmware"
    ],
    "color": "greybox",
    "author": [
      "Michael Chesser",
      "Surya Nepal",
      "Damith C. Ranasinghe"
    ],
    "toolurl": "https://github.com/MultiFuzz/MultiFuzz",
    "title": "MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Fuzzware",
      "Hoedur"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-chesser.pdf"
    ]
  },
  {
    "name": "MundoFuzz",
    "year": 2022,
    "targets": [
      "Hypervisor"
    ],
    "color": "greybox",
    "author": [
      "Cheolwoo Myung",
      "Gwangmu Lee",
      "Byoungyoung Lee"
    ],
    "title": "MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "AFL"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/sec22-myung.pdf"
    ]
  },
  {
    "name": "MutaGen",
    "year": 2015,
    "author": [
      "Ulf Kargén",
      "Nahid Shahmehri"
    ],
    "title": "Turning Programs Against Each Other: High Coverage Fuzz-testing Using Binary-code Mutation and Dynamic Slicing",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "miscurl": [
      "https://www.ida.liu.se/~ulfka17/papers/FSE2015.pdf"
    ],
    "references": [
      "CSmith",
      "TaintScope"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "Muzz",
    "year": 2020,
    "author": [
      "Hongxu Chen",
      "Shengjian Guo",
      "Yinxing Xue",
      "Yulei Sui",
      "Cen Zhang",
      "Yuekang Li",
      "Haijun Wang",
      "Yang Liu"
    ],
    "title": "MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/sec20-chen-hongxu.pdf"
    ],
    "references": [
      "AFL",
      "Razzer"
    ],
    "targets": [
      "Concurrency"
    ],
    "color": "greybox"
  },
  {
    "name": "NAUTILUS",
    "year": "2023",
    "targets": [
      "API"
    ],
    "color": "blackbox",
    "references": [
      "RESTler"
    ],
    "author": [
      "Gelei Deng",
      "Zhiyi Zhang",
      "Yuekang Li",
      "Yi Liu",
      "Tianwei Zhang",
      "Yang Liu",
      "Guo Yu",
      "Dongjin Wang"
    ],
    "toolurl": "https://sites.google.com/view/nautilus-testing",
    "title": "Nautilus: Automated RESTful API Vulnerability Detection",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity23-deng-gelei.pdf"
    ]
  },
  {
    "name": "NEXZZER",
    "year": "2025",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "references": [
      "Hopper"
    ],
    "author": [
      "Jiayi Lin",
      "Qingyu Zhang",
      "Junzhe Li",
      "Chenxin Sun",
      "Hao Zhou",
      "Changhua Luo",
      "Chenxiong Qian"
    ],
    "toolurl": "https://figshare.com/s/9539927ac84ee6a7ac14",
    "title": "NEXZZER: Automatic Library Fuzzing through API Relation Evolvement",
    "booktitle": "Network and Distributed System Security Symposium (NDSS) 2025",
    "journal": "NDSS",
    "miscurl": [
      "https://dx.doi.org/10.14722/ndss.2025.240750"
    ],
    "keywords": [
      "library fuzzing"
    ]
  },
  {
    "name": "NTFuzz",
    "year": 2021,
    "author": [
      "Jaeseung Choi",
      "Kangsu Kim",
      "Daejin Lee",
      "Sang Kil Cha"
    ],
    "title": "NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://softsec.kaist.ac.kr/~jschoi/data/oakland2021.pdf"
    ],
    "targets": [
      "Kernel"
    ],
    "references": [
      "IMF"
    ],
    "color": "greybox"
  },
  {
    "name": "NablaFuzz",
    "year": "2023",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "author": [
      "Chenyuan Yang",
      "Yinlin Deng",
      "Jiayi Yao",
      "Yuxing Tu",
      "Hanchi Li",
      "Lingming Zhang"
    ],
    "toolurl": "https://github.com/ise-uiuc/NablaFuzz",
    "title": "Fuzzing Automatic Differentiation in Deep-Learning Libraries",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "references": [
      "FreeFuzz"
    ],
    "miscurl": [
      "https://yangchenyuan.github.io/files/ICSE23-NablaFuzz.pdf"
    ]
  },
  {
    "name": "Narada",
    "year": 2015,
    "author": [
      "Malavika Samak",
      "Murali Krishna Ramanathan",
      "Suresh Jagannathan"
    ],
    "title": "Synthesizing Racy Tests",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "references": [
      "RaceFuzzer"
    ],
    "targets": [
      "Concurrency"
    ],
    "color": "whitebox"
  },
  {
    "name": "NaturalFuzz",
    "year": "2023",
    "targets": [
      "DISC (Data-Intensive Scalable Computing) Systems"
    ],
    "color": "greybox",
    "references": [
      "BigFuzz"
    ],
    "author": [
      "Ahmad Humayun",
      "Yaoxuan Wu",
      "Miryung Kim",
      "Muhammad Ali Gulzar"
    ],
    "toolurl": "https://github.com/SEED-VT/NaturalFuzz",
    "title": "NaturalFuzz: Natural Input Generation for Big Data Analytics",
    "booktitle": "Proceedings of the International Conference on Automated Software Engineering",
    "miscurl": [
      "https://rohan.padhye.org/files/bigfuzz-ase20.pdf"
    ]
  },
  {
    "name": "Nautilus",
    "year": 2019,
    "author": [
      "Cornelius Aschermann",
      "Tommaso Frassetto",
      "Thorsten Holz",
      "Patrick Jauernig",
      "Ahmad-Reza Sadeghi",
      "Daniel Teuchert"
    ],
    "title": "Nautilus: Fishing for Deep Bugs with Grammars",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "toolurl": "https://github.com/nautilus-fuzz/nautilus",
    "miscurl": [
      "https://www.syssec.ruhr-uni-bochum.de/media/emma/veroeffentlichungen/2018/12/17/NDSS19-Nautilus.pdf"
    ],
    "targets": [
      "File"
    ],
    "references": [
      "AFL"
    ],
    "color": "greybox"
  },
  {
    "name": "Nduja",
    "year": 2012,
    "author": [
      "Rosario Valotta"
    ],
    "title": "Taking Browsers Fuzzing To The Next (DOM) Level",
    "booktitle": "Proceedings of the DeepSec",
    "targets": [
      "File"
    ],
    "references": [
      "cross_fuzz"
    ],
    "color": "blackbox"
  },
  {
    "name": "NestFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
    "author": [
      "Peng Deng",
      "Zhemin Yang",
      "Lei Zhang",
      "Guangliang Yang",
      "Wenzheng Hong",
      "Yuan Zhang",
      "Min Yang"
    ],
    "toolurl": "https://github.com/fdu-sec/NestFuzz",
    "title": "NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic",
    "booktitle": "Proceedings of the ACM Conference on Computer and Communications Security",
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3576915.3623103"
    ]
  },
  {
    "name": "NeuralFuzzer",
    "year": 2016,
    "author": [
      "CIFASIS"
    ],
    "toolurl": "https://github.com/CIFASIS/neural-fuzzer",
    "references": [
      "QuickFuzz"
    ],
    "targets": [
      "File"
    ],
    "color": "blackbox"
  },
  {
    "name": "Neutaint",
    "year": 2020,
    "author": [
      "Dongdong She",
      "Yizheng Chen",
      "Abhishek Shah",
      "Baishakhi Ray",
      "Suman Jana"
    ],
    "title": "Neutaint: Efficient Dynamic Taint Analysis with Neural Networks",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.cs.columbia.edu/~ass/publication/neutaint/"
    ],
    "targets": [
      "File"
    ],
    "color": "whitebox"
  },
  {
    "name": "Neuzz",
    "year": 2019,
    "author": [
      "Dongdong She",
      "Kexin Pei",
      "Dave Epstein",
      "Junfeng Yang",
      "Baishakhi Ray",
      "Suman Jana"
    ],
    "title": "Neuzz: Efficient Fuzzing with Neural Program Smoothing",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "toolurl": "https://github.com/Dongdongshe/neuzz",
    "targets": [
      "File"
    ],
    "references": [
      "AFL",
      "Learn&Fuzz"
    ],
    "color": "greybox"
  },
  {
    "name": "Neuzz++",
    "year": 2023,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Maria-Irina Nicolae",
      "Max Eisele",
      "Andreas Zeller"
    ],
    "toolurl": "https://github.com/boschresearch/neuzzplusplus",
    "title": "Revisiting Neural Program Smoothing for Fuzzing",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "Neuzz",
      "AFL++"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3611643.3616308"
    ]
  },
  {
    "name": "Nightmare",
    "year": 2014,
    "author": [
      "Joxean Koret"
    ],
    "toolurl": "https://github.com/joxeankoret/nightmare",
    "targets": [
      "File"
    ],
    "references": [
      "radamsa"
    ],
    "color": "greybox"
  },
  {
    "name": "NodeMedic-FINE",
    "year": "2025",
    "targets": [
      "JavaScript"
    ],
    "color": "greybox",
    "references": [
      "FAST"
    ],
    "author": [
      "Darion Cassel",
      "Nuno Sabino",
      "Min-Chien Hsu",
      "Ruben Martins",
      "Limin Jia"
    ],
    "toolurl": "https://zenodo.org/records/14249091",
    "title": "NodeMedic-FINE: Automatic Detection and Exploit Synthesis for Node.js Vulnerabilities",
    "booktitle": "Proceedings of the Network and Distributed System Security Symposium",
    "miscurl": [
      "https://www.ndss-symposium.org/wp-content/uploads/2025-1636-paper.pdf"
    ]
  },
  {
    "name": "Nyx",
    "year": 2021,
    "author": [
      "Sergej Schumilo",
      "Cornelius Aschermann",
      "Ali Abbasi",
      "Simon Wörner",
      "Thorsten Holz"
    ],
    "title": "NYX: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "toolurl": "https://github.com/RUB-SysSec/nyx",
    "miscurl": [
      "https://www.usenix.org/system/files/sec21summer_schumilo.pdf"
    ],
    "targets": [
      "Hypervisor"
    ],
    "references": [
      "HYPER-CUBE",
      "kAFL"
    ],
    "color": "greybox"
  },
  {
    "name": "OGHARN",
    "year": "2025",
    "targets": [
      "API"
    ],
    "color": "greybox",
    "references": [
      "Hopper"
    ],
    "author": [
      "Gabriel Sherman",
      "Stefan Nagy"
    ],
    "toolurl": "https://github.com/FuturesLab/OGHarn",
    "title": "No Harness, No Problem: Oracle-guided Harnessing for Auto-generating C API Fuzzing Harnesses",
    "booktitle": "Proceedings of the International Conference on Software Engineering",
    "miscurl": [
      "https://users.cs.utah.edu/~snagy/papers/25ICSE-b.pdf"
    ],
    "keywords": [
      "C API Fuzzing"
    ]
  },
  {
    "name": "OddFuzz",
    "year": "2023",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Sicong Cao",
      "Biao He",
      "Xiaobing Sun",
      "Yu Ouyang",
      "Chao Zhang",
      "Xiaoxue Wu",
      "Ting Su",
      "Lili Bo",
      "Bin Li",
      "Chuanlei Ma",
      "Jiajia Li",
      "Tao Wei"
    ],
    "toolurl": "https://github.com/ODDFuzz/ODDFuzz",
    "title": "ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "references": [
      "AFLGo"
    ],
    "miscurl": [
      "https://arxiv.org/pdf/2304.04233.pdf"
    ],
    "keywords": [
      "Java",
      "Deserialization"
    ]
  },
  {
    "name": "OptFuzz",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Jiming Wang",
      "Yan Kang",
      "Chenggang Wu",
      "Yuhao Hu",
      "Yue Sun",
      "Jikai Ren",
      "Yuanming Lai",
      "Mengyao Xie",
      "Charles Zhang",
      "Tao Li",
      "Zhe Wang"
    ],
    "toolurl": "https://github.com/JimWongM/OptFuzz",
    "title": "OptFuzz: Optimization Path Guided Fuzzing for JavaScript JIT Compilers",
    "booktitle": "Proceedings of the USENIX Security Symposium",
    "references": [
      "Fuzzilli"
    ],
    "miscurl": [
      "https://www.usenix.org/system/files/usenixsecurity24-wang-jiming.pdf"
    ],
    "keywords": [
      "JavaScript",
      "JIT compiler"
    ]
  },
  {
    "name": "Optimuzz",
    "year": "2025",
    "targets": [
      "Compiler"
    ],
    "color": "greybox",
    "references": [
      "AFLGo",
      "Fuzzilli"
    ],
    "author": [
      "Jaeseong Kwon",
      "Bongjun Jang",
      "Juneyoung Lee",
      "Kihong Heo"
    ],
    "toolurl": "https://prosys.kaist.ac.kr/optimuzz",
    "title": "Optimization-Directed Compiler Fuzzing for Continuous Translation Validation",
    "booktitle": "Proceedings of the ACM Conference on Programming Language Design and Implementation",
    "miscurl": [
      "https://doi.org/10.1145/3729275"
    ],
    "keywords": [
      "compiler fuzzing",
      "translation validation"
    ]
  },
  {
    "name": "PATA",
    "year": 2022,
    "targets": [
      "File"
    ],
    "color": "greybox",
    "author": [
      "Jie Liang",
      "Mingzhe Wang",
      "Chijin Zhou",
      "Zhiyong Wu",
      "Yu Jiang",
      "Jianzhong Liu",
      "Zhe Liu",
      "Jiaguang Sun"
    ],
    "toolurl": "https://github.com/PATA-FUZZ/pata",
    "title": "PATA: Fuzzing with Path Aware Taint Analysis",
    "booktitle": "Proceedings of the IEEE Symposium on Security and Privacy",
    "miscurl": [
      "https://www.computer.org/csdl/proceedings-article/sp/2022/131600a154/1wKCe9rJFfi"
    ]
  },
  {
    "name": "PBFDroid",
    "year": 2023,
    "targets": [
      "UI"
    ],
    "color": "blackbox",
    "author": [
      "Jingling Sun",
      "Ting Su",
      "Jiayi Jiang",
      "Jue Wang",
      "Geguang Pu",
      "Zhendong Su"
    ],
    "toolurl": "https://github.com/property-based-fuzzing/home",
    "title": "Property-Based Fuzzing for Finding Data Manipulation Errors in Android Apps",
    "booktitle": "Proceedings of the International Symposium on Foundations of Software Engineering",
    "references": [
      "JQF",
      "APE"
    ],
    "miscurl": [
      "https://dl.acm.org/doi/pdf/10.1145/3611643.3616286"
    ]
  },
  {
    "name": "PDGF",
    "year": "2024",
    "targets": [
      "File"
    ],
    "color": "greybox",
    "references": [
      "AFL"
    ],
Download .txt
gitextract_p4wfrv2j/

├── .gitattributes
├── CNAME
├── CONTRIBUTING.md
├── COPYING.md
├── README.md
├── css/
│   └── asefuzz.css
├── data/
│   └── fuzzers.json
├── fonts/
│   └── FontAwesome.otf
├── index.html
├── js/
│   └── asefuzz.js
└── script.py
Download .txt
SYMBOL INDEX (53 symbols across 2 files)

FILE: js/asefuzz.js
  function createCanvas (line 26) | function createCanvas(width, height) {
  function parseJSONData (line 33) | function parseJSONData(arr) {
  function drawEdges (line 53) | function drawEdges(g, d) {
  function buildAuthors (line 62) | function buildAuthors(node) {
  function buildRef (line 72) | function buildRef(node) {
  function appendPublicationOrCredit (line 94) | function appendPublicationOrCredit(list, node) {
  function constructIcon (line 105) | function constructIcon(faName, title) {
  function constructCharSpan (line 109) | function constructCharSpan(ch, title) {
  function appendToolURL (line 113) | function appendToolURL(list, node) {
  function appendTargetInfo (line 125) | function appendTargetInfo(list, node) {
  function appendMiscURL (line 155) | function appendMiscURL(list, node) {
  function appendSharableLink (line 169) | function appendSharableLink(list, node) {
  function getPubYear (line 177) | function getPubYear(node) {
  function setTitle (line 182) | function setTitle(node) {
  function clearContents (line 192) | function clearContents() {
  function showInfobox (line 196) | function showInfobox() {
  function hideInfobox (line 200) | function hideInfobox() {
  function onClick (line 204) | function onClick(node) {
  function drawNodes (line 216) | function drawNodes(g, d, simulation) {
  function computeMaxYear (line 278) | function computeMaxYear(d) {
  function installZoomHandler (line 284) | function installZoomHandler(height, canvas, g, d) {
  function fieldMatch (line 299) | function fieldMatch(field, re) {
  function arrayMatch (line 304) | function arrayMatch(targets, re) {
  function escapeRegExp (line 312) | function escapeRegExp(string) {
  function clearSearchResults (line 316) | function clearSearchResults(nodes, resultList) {
  function showFuzzer (line 323) | function showFuzzer(node, nodes, zoom, canvas, width, height) {
  function installSearchHandler (line 335) | function installSearchHandler(width, height, canvas, zoom, nodes) {
  function installClickHandler (line 404) | function installClickHandler(nodes) {
  function installDragHandler (line 411) | function installDragHandler() {
  function installInfoBoxCloseHandler (line 426) | function installInfoBoxCloseHandler() {
  function computeYPos (line 430) | function computeYPos(year) {
  function ticked (line 434) | function ticked(links, nodes, simulation) {
  function initSimulation (line 450) | function initSimulation(d, simulation, width, height, links, nodes) {
  function addStatItem (line 467) | function addStatItem(dict, key, id) {
  function sortByCount (line 472) | function sortByCount(stats) {
  function sortFuzzersByYear (line 486) | function sortFuzzersByYear(fuzzerMap, fuzzers) {
  function makeAccordionElm (line 493) | function makeAccordionElm(data, handle, myid, header, fuzzers, fnLink) {
  function fuzzerToString (line 516) | function fuzzerToString(fuzzer) {
  function makeAnchor (line 526) | function makeAnchor(fuzzerMap, f) {
  function makeAccordion (line 533) | function makeAccordion(fuzzerMap, data, id, handle) {
  function makeVenueAccordion (line 549) | function makeVenueAccordion(fuzzerMap, venues) {
  function makeTargetAccordion (line 553) | function makeTargetAccordion(fuzzerMap, targets) {
  function makeAuthorAccordion (line 557) | function makeAuthorAccordion(fuzzerMap, authors) {
  function filterAndSortAccordion (line 561) | function filterAndSortAccordion(acc, str, container) {
  function registerStatsFilter (line 586) | function registerStatsFilter(venueAcc, targetAcc, authorAcc) {
  function initStats (line 599) | function initStats(data) {
  function getQueryVariable (line 632) | function getQueryVariable(variable) {

FILE: script.py
  class RefCompleter (line 8) | class RefCompleter(object):
    method __init__ (line 9) | def __init__(self, options):
    method complete (line 12) | def complete(self, text, state):
  function is_empty_field (line 27) | def is_empty_field(field):
  function is_valid_color (line 31) | def is_valid_color(color):
  function is_valid_references (line 35) | def is_valid_references(db, refs):
Condensed preview — 11 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (347K chars).
[
  {
    "path": ".gitattributes",
    "chars": 12,
    "preview": "*.json text\n"
  },
  {
    "path": "CNAME",
    "chars": 19,
    "preview": "fuzzing-survey.org\n"
  },
  {
    "path": "CONTRIBUTING.md",
    "chars": 2799,
    "preview": "# Contribution Guideline\n\nPlease read this guideline before creating a pull request (PR) or an issue on\nthis repository."
  },
  {
    "path": "COPYING.md",
    "chars": 35823,
    "preview": "                    GNU GENERAL PUBLIC LICENSE\r\n                       Version 3, 29 June 2007\r\n\r\n Copyright (C) 2007 Fr"
  },
  {
    "path": "README.md",
    "chars": 2652,
    "preview": "# Genealogy Database of Fuzzers\n\nThis repository is our attempt to maintain an up-to-date genealogy database of\nfuzzers "
  },
  {
    "path": "css/asefuzz.css",
    "chars": 2566,
    "preview": "/* */\n\nbody {\n  display: flex;\n  flex-direction: column;\n  min-height: 100vh;\n  height: 100%;\n  overflow: hidden;\n}\n\n.ma"
  },
  {
    "path": "data/fuzzers.json",
    "chars": 240093,
    "preview": "[\n  {\n    \"name\": \"ACTOR\",\n    \"year\": \"2023\",\n    \"targets\": [\n      \"Kernel\"\n    ],\n    \"color\": \"greybox\",\n    \"autho"
  },
  {
    "path": "index.html",
    "chars": 6524,
    "preview": "<!doctype html>\n<html>\n  <head>\n    <meta charset=\"utf-8\">\n    <meta name=\"viewport\"\n          content=\"width=device-wid"
  },
  {
    "path": "js/asefuzz.js",
    "chars": 20230,
    "preview": "// Art, Science, and Engineering of Fuzzing\n//\n// Copyright (C) 2019 Sang Kil Cha\n//\n// This program comes with ABSOLUTE"
  },
  {
    "path": "script.py",
    "chars": 2677,
    "preview": "import json\nimport sys\nimport readline\n\nDATA_FILE = 'data/fuzzers.json'\n\n\nclass RefCompleter(object):\n    def __init__(s"
  }
]

// ... and 1 more files (download for full content)

About this extraction

This page contains the full source code of the SoftSec-KAIST/Fuzzing-Survey GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 11 files (306.0 KB), approximately 89.8k tokens, and a symbol index with 53 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!