Zum Hauptinhalt springen

Showing 1–2 of 2 results for author: Crump, A

Searching in archive cs. Search in all archives.
.
  1. SoK: Prudent Evaluation Practices for Fuzzing

    Authors: Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz

    Abstract: Fuzzing has proven to be a highly effective approach to uncover software bugs over the past decade. After AFL popularized the groundbreaking concept of lightweight coverage feedback, the field of fuzzing has seen a vast amount of scientific work proposing new techniques, improving methodological aspects of existing strategies, or porting existing methods to new domains. All such work must demonstr… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2201.09941  [pdf, other

    cs.CR cs.AR cs.SE

    TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities

    Authors: Aakash Tyagi, Addison Crump, Ahmad-Reza Sadeghi, Garrett Persyn, Jeyavijayan Rajendran, Patrick Jauernig, Rahul Kande

    Abstract: The increasing complexity of modern processors poses many challenges to existing hardware verification tools and methodologies for detecting security-critical bugs. Recent attacks on processors have shown the fatal consequences of uncovering and exploiting hardware vulnerabilities. Fuzzing has emerged as a promising technique for detecting software vulnerabilities. Recently, a few hardware fuzzi… ▽ More

    Submitted 24 January, 2022; originally announced January 2022.

    Comments: To be published in the proceedings of the 31st USENIX Security Symposium, 2022