TīmeklisEVMFuzzer: detect EVM vulnerabilities via fuzz testing. Y Fu, M Ren, F Ma, H Shi, X Yang, Y Jiang, H Li, X Shi. Proceedings of the 2024 27th ACM Joint Meeting on European Software ... TīmeklisYing Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, and Xiang Shi. Evmfuzzer: detect evm vulnerabilities via fuzz testing. In Proceedings of the 2024 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pages 1110--1114. ACM, …
HEALER: Relation Learning Guided Kernel Fuzzing - ACM …
TīmeklisYing Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, and Xiang Shi. 2024. EVMFuzzer: Detect EVM vulnerabilities via fuzz testing. (2024). Google Scholar; Vijay Ganesh, Tim Leek, and Martin C. Rinard. 2009. Taint-based directed whitebox fuzzing. 2009 IEEE 31st International Conference on Software … TīmeklislibFuzzer [30] and has found two low-impact bugs. EVM-Fuzzer [22] is a more recent fuzzerthat generates Solidity [20] code of contracts. However, the blockchain state model of existing fuzzers falls short to cover the full search space for finding consensus bugs. The fullsearchspace consists ofthe setofpossible client flats to rent in farnham
GitHub - renardbebe/EVMFuzzer: Differential Fuzz Testing of …
Tīmeklis2024. gada 14. sept. · Ying Fu, Meng Ren, Fuchen Ma, Heyuan Shi, Xin Yang, Yu Jiang, Huizhong Li, and Xiang Shi. 2024. EVMFuzzer: detect EVM vulnerabilities via fuzz testing. In Proceedings of the 2024 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software … Tīmeklisof several popular ICS protocols. EVMFuzzer [11] detects many EVM vulnerabilities by mutation-based fuzzing. Beyond that, mutation-based fuzzing is also widely adopted in industry practice [1], [2], [8], [19], [20], [27]. As Figure 1 shows, mutation-based fuzzing maintains an input seed pool and mainly contains four stages: (1) Preparing TīmeklisWith EVMFuzzer, we have found several previously unknown security bugs in four widely used EVMs, and 5 of which had been included in Common Vulnerabilities and … flats to rent in faringdon oxfordshire