Fuzzing
repo: cpuu/awesome-fuzzing
category: Security
related: Testing
Awesome Fuzzing 
Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. Typically, fuzzers are used to test programs that take structured inputs.
A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.
Your favorite tool or your own paper is not listed? Fork and create a Pull Request to add it!
Contents
Books
- Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU (2023)
- Fuzzing-101
- The Fuzzing Book (2019)
- The Art, Science, and Engineering of Fuzzing: A Survey (2019) - Actually, this document is a paper, but it contains more important and essential content than any other book.
- [Fuzzing for Software Security Testing and Quality Assurance, 2nd Edition](https://www.amazon.com/Fuzzing-Software-Security-Testing-Assurance/dp/1608078507/) (2018)
- Fuzzing: Brute Force Vulnerability Discovery, 1st Edition (2007)
- Open Source Fuzzing Tools, 1st Edition (2007)
Talks
- Fuzzing Labs - Patrick Ventuzelo - YouTube.
- Effective File Format Fuzzing - Black Hat Europe 2016.
- Adventures in Fuzzing - NYU Talk 2018.
- Fuzzing with AFL - NDC Conferences 2018.
Papers
To achieve a well-defined scope, I have chosen to include publications on fuzzing from 4 top major security conferences (2008–2025): (i) Network and Distributed System Security Symposium (NDSS), (ii) IEEE Symposium on Security and Privacy (S&P), (iii) USENIX Security Symposium (USEC), and (iv) ACM Conference on Computer and Communications Security (CCS).
Note: Papers are selected based on whether the title contains the keyword "fuzz." If a paper is related to fuzzing but does not include "fuzz" in its title, it may have been missed. In that case, please open a Pull Request and it will be reviewed for inclusion.
The Network and Distributed System Security Symposium (NDSS)
<details><summary>2025 (10 papers)</summary>
- Automatic Library Fuzzing through API Relation Evolvement, 2025
- Blackbox Fuzzing of Distributed Systems with Multi-Dimensional Inputs and Symmetry-Based Feedback Pruning, 2025
- [DUMPLING: Fine-grained Differential JavaScript Engine Fuzzing, 2025](https://www.ndss-symposium.org/wp-content/uploads/2025-1411-paper.pdf)
- FUZZUER: Enabling Fuzzing of UEFI Interfaces on EDK-2, 2025
- ICSQuartz: Scan Cycle-Aware and Vendor-Agnostic Fuzzing for Industrial Control Systems, 2025
- [MALintent: Coverage Guided Intent Fuzzing Framework for Android, 2025](https://www.ndss-symposium.org/wp-content/uploads/2025-125-paper.pdf)
- Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States, 2025
- MSan: Efficiently Detecting Uninitialized Memory Errors During Fuzzing, 2025
- Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices, 2025
- [TWINFUZZ: Differential Testing of Video Hardware Acceleration Stacks, 2025](https://www.ndss-symposium.org/wp-content/uploads/2025-526-paper.pdf)
</details>
<details><summary>2024 (7 papers)</summary>
- DeepGo: Predictive Directed Greybox Fuzzing, 2024
- EnclaveFuzz: Finding Vulnerabilities in SGX Applications, 2024
- Large Language Model guided Protocol Fuzzing, 2024
- MOCK: Optimizing Kernel Fuzzing Mutation with Context-aware Dependency, 2024
- Predictive Context-sensitive Fuzzing, 2024
- ReqsMiner: Automated Discovery of CDN Forwarding Request Inconsistencies and DoS Attacks with Grammar-based Fuzzing, 2024
- ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection, 2024
</details>
<details><summary>2023 (4 papers)</summary>
- DARWIN: Survival of the Fittest Fuzzing Mutators, 2023
- [FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities, 2023](https://www.ndss-symposium.org/wp-content/uploads/2023-290-paper.pdf)
- LOKI: State-Aware Fuzzing Framework for the Implementation of Blockchain Consensus Protocols, 2023
- [No Grammar, No Problem: Towards Fuzzing the Linux Kernel without System-Call Description, 2023](https://www.ndss-symposium.org/wp-content/uploads/2023-688-paper.pdf)
</details>
<details><summary>2022 (4 papers)</summary>
- Semantic-Informed Driver Fuzzing Without Both the Hardware Devices and the Emulators, 2022
- MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing, 2022
- Context-Sensitive and Directional Concurrency Fuzzing for Data-Race Detection, 2022
- EMS: History-Driven Mutation for Coverage-based Fuzzing, 2022
</details>
<details><summary>2021 (4 papers)</summary>
- [WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning, 2021](https://taesoo.kim/pubs/2021/jung:winnie.pdf)
- [Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing, 2021](https://www.cs.ucr.edu/~heng/pubs/afl-hier.pdf)
- PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles, 2021
- [Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test Cases, 2021](https://www.ndss-symposium.org/wp-content/uploads/ndss2021_6A-2_24224_paper.pdf)
</details>
<details><summary>2020 (4 papers)</summary>
- [HFL: Hybrid Fuzzing on the Linux Kernel, 2020](https://www.unexploitable.systems/publication/kimhfl/)
- HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing, 2020
- HYPER-CUBE: High-Dimensional Hypervisor Fuzzing, 2020
- Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization, 2020
</details>
<details><summary>2019 (5 papers)</summary>
- [CodeAlchemist: Semantics-Aware Code Generation to Find Vulnerabilities in JavaScript Engines, 2019](https://daramg.gift/paper/han-ndss2019.pdf)
- PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary, 2019
- REDQUEEN: Fuzzing with Input-to-State Correspondence, 2019
- Send Hardest Problems My Way: Probabilistic Path Prioritization for Hybrid Fuzzing, 2019
- Life after Speech Recognition: Fuzzing Semantic Misinterpretation for Voice Assistant Applications, 2019
</details>
<details><summary>2018 (4 papers)</summary>
- INSTRIM: Lightweight Instrumentation for Coverage-guided Fuzzing, 2018
- IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing, 2018
- What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices, 2018
- [Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing, 2018](https://lifeasageek.github.io/papers/han:meds.pdf)
</details>
<details><summary>2017 (2 papers)</summary>
- Vuzzer: Application-aware evolutionary fuzzing, 2017
- [DELTA: A Security Assessment Framework for Software-Defined Networks, 2017](https://www.ndss-symposium.org/wp-content/uploads/2017/09/ndss201702A-1LeePaper.pdf)
</details>
<details><summary>2016 (1 paper)</summary>
</details>
<details><summary>2008 (1 paper)</summary>
- [Automated Whitebox Fuzz Testing, 2008](https://www.ndss-symposium.org/wp-content/uploads/2017/09/Automated-Whitebox-Fuzz-Testing-paper-Patrice-Godefroid.pdf)
</details>
IEEE Symposium on Security and Privacy (IEEE S&P)
<details><summary>2025 (7 papers)</summary>
- CHIMERA: Fuzzing P4 Network Infrastructure for Multi-Plane Bug Detection and Vulnerability Discovery, 2025
- FirmRCA: Towards Post-Fuzzing Analysis on ARM Embedded Firmware with Efficient Event-based Fault Localization, 2025
- [Fuzz-Testing Meets LLM-Based Agents: An Automated and Efficient Framework for Jailbreaking Text-To-Image Generation Models, 2025](https://www.computer.org/csdl/proceedings-article/sp/2025/223600a336/26hiTETXKow)
- [HouseFuzz: Service-Aware Grey-Box Fuzzing for Vulnerability Detection in Linux-Based Firmware, 2025](https://www.computer.org/csdl/proceedings-article/sp/2025/223600d507/26hiVy3bGHm)
- Predator: Directed Web Application Fuzzing for Efficient Vulnerability Validation, 2025
- [RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes, 2025](https://www.computer.org/csdl/proceedings-article/sp/2025/223600a003/21B7PWv1JGU)
- Stateful Analysis and Fuzzing of Commercial Baseband Firmware, 2025
</details>
<details><summary>2024 (14 papers)</summary>
- AFGen: Whole-Function Fuzzing for Applications and Libraries, 2024
- Chronos: Finding Timeout Bugs in Practical Distributed Systems by Deep-Priority Fuzzing with Transient Delay, 2024
- [DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing, 2024](https://www.computer.org/csdl/proceedings-article/sp/2024/313000a096/1Ub234bjuWA)
- Everything is Good for Something: Counterexample-Guided Directed Fuzzing via Likely Invariant Inference, 2024
- LABRADOR: Response Guided Directed Fuzzing for Black-box IoT Devices, 2024
- LLMIF: Augmented Large Language Model for Fuzzing IoT Devices, 2024
- Predecessor-aware Directed Greybox Fuzzing, 2024
- SATURN: Host-Gadget Synergistic USB Driver Fuzzing, 2024
- SoK: Prudent Evaluation Practices for Fuzzing, 2024
- SyzGen++: Dependency Inference for Augmenting Kernel Driver Fuzzing, 2024
- SyzTrust: State-aware Fuzzing on Trusted OS Designed for IoT Devices, 2024
- Titan: Efficient Multi-target Directed Greybox Fuzzing, 2024
- [To Boldly Go Where No Fuzzer Has Gone Before: Finding Bugs in Linux' Wireless Stacks through VirtIO Devices, 2024](https://www.computer.org/csdl/proceedings-article/sp/2024/313000a024/1RjEa0y9RMQ)
- Towards Smart Contract Fuzzing on GPU, 2024
</details>
<details><summary>2023 (10 papers)</summary>
- [TEEzz: Fuzzing Trusted Applications on COTS Android Devices, 2023](https://hexhive.epfl.ch/publications/files/23Oakland.pdf)
- SEGFUZZ: Segmentizing Thread Interleaving to Discover Kernel Concurrency Bugs through Fuzzing, 2023
- RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing, 2023
- Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities, 2023
- UTOPIA: Automatic Generation of Fuzz Driver using Unit Tests, 2023
- SelectFuzz: Efficient Directed Fuzzing with Selective Path Exploration, 2023
- [Finding Specification Blind Spots via Fuzz Testing, 2023](https://www.computer.org/csdl/proceedings-article/sp/2023/933600c708/1OXH7BohI2Y)
- [ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing, 2023](https://www.computer.org/csdl/proceedings-article/sp/2023/933600c726/1OXH0xA0Lrq)
- VIDEZZO: Dependency-aware Virtual Device Fuzzing, 2023
- DEVFUZZ: Automatic Device Model-Guided Device Driver Fuzzing, 2023
</details>
<details><summary>2022 (5 papers)</summary>
- PATA: Fuzzing with Path Aware Taint Analysis, 2022
- Jigsaw: Efficient and Scalable Path Constraints Fuzzing, 2022
- [FuzzUSB: Hybrid Stateful Fuzzing of USB Gadget Stacks, 2022](https://github.com/purseclab/fuzzusb/blob/main/paper/fuzzusb.pdf)
- [Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis, 2022](https://arxiv.org/pdf/2203.12064.pdf)
- BEACON : Directed Grey-Box Fuzzing with Provable Path Pruning, 2022
</details>
<details><summary>2021 (5 papers)</summary>
- STOCHFUZZ: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting, 2021
- [One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation, 2021](https://huhong789.github.io/papers/polyglot-oakland2021.pdf)
- [NTFUZZ: Enabling Type-Aware Kernel Fuzzing on Windows with Static Binary Analysis, 2021](https://softsec.kaist.ac.kr/~jschoi/data/oakland2021.pdf)
- [DIFUZZRTL: Differential Fuzz Testing to Find CPU Bugs, 2021](https://lifeasageek.github.io/papers/jaewon-difuzzrtl.pdf)
- [DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices, 2021](https://conand.me/publications/redini-diane-2021.pdf)
</details>
<details><summary>2020 (5 papers)</summary>
- [Fuzzing JavaScript Engines with Aspect-preserving Mutation, 2020](https://jakkdu.github.io/pubs/2020/park:die.pdf)
- IJON: Exploring Deep State Spaces via Fuzzing, 2020
- Krace: Data Race Fuzzing for Kernel File Systems, 2020
- Pangolin:Incremental Hybrid Fuzzing with Polyhedral Path Abstraction, 2020
- RetroWrite: Statically Instrumenting COTS Binaries for Fuzzing and Sanitization, 2020
</details>
<details><summary>2019 (4 papers)</summary>
- Full-speed Fuzzing: Reducing Fuzzing Overhead through Coverage-guided Tracing, 2019
- Fuzzing File Systems via Two-Dimensional Input Space Exploration, 2019
- NEUZZ: Efficient Fuzzing with Neural Program Smoothing, 2019
- Razzer: Finding Kernel Race Bugs through Fuzzing, 2019
</details>
<details><summary>2018 (3 papers)</summary>
- Angora: Efficient Fuzzing by Principled Search, 2018
- CollAFL: Path Sensitive Fuzzing, 2018
- T-Fuzz: fuzzing by program transformation, 2018
</details>
<details><summary>2017 (1 paper)</summary>
- [Skyfire: Data-Driven Seed Generation for Fuzzing, 2017](https://www.ieee-security.org/TC/SP2017/papers/42.pdf)
</details>
<details><summary>2015 (1 paper)</summary>
</details>
<details><summary>2010 (1 paper)</summary>
</details>
USENIX Security
<details><summary>2025 (14 papers)</summary>
- AidFuzzer: Adaptive Interrupt-Driven Firmware Fuzzing via Run-Time State Recognition, 2025
- ChainFuzz: Exploiting Upstream Vulnerabilities in Open-Source Supply Chains, 2025
- [CoreCrisis: Threat-Guided and Context-Aware Iterative Learning and Fuzzing of 5G Core Networks, 2025](https://www.usenix.org/system/files/usenixsecurity25-dong-yilu.pdf)
- Effective Directed Fuzzing with Hierarchical Scheduling for Web Vulnerability Detection, 2025
- Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection, 2025
- From Alarms to Real Bugs: Multi-target Multi-step Directed Greybox Fuzzing for Static Analysis Result Verification, 2025
- Fuzzing the PHP Interpreter via Dataflow Fusion, 2025
- GenHuzz: An Efficient Generative Hardware Fuzzer, 2025
- Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz, 2025
- Low-Cost and Comprehensive Non-textual Input Fuzzing with LLM-Synthesized Input Generators, 2025
- [MBFuzzer: A Multi-Party Protocol Fuzzer for MQTT Brokers, 2025](https://www.usenix.org/system/files/usenixsecurity25-song-xiangpu.pdf)
- [PAPILLON: Efficient and Stealthy Fuzz Testing-Powered Jailbreaks for LLMs, 2025](https://www.usenix.org/system/files/usenixsecurity25-gong-xueluan.pdf)
- Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback, 2025
- [Waltzz: WebAssembly Runtime Fuzzing with Stack-Invariant Transformation, 2025](https://www.usenix.org/system/files/usenixsecurity25-zhang-lingming.pdf)
</details>
<details><summary>2024 (12 papers)</summary>
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities, 2024
- Cascade: CPU Fuzzing via Intricate Program Generation, 2024
- Critical Code Guided Directed Greybox Fuzzing for Commits, 2024
- EL3XIR: Fuzzing COTS Secure Monitors, 2024
- Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing, 2024
- HYPERPILL: Fuzzing for Hypervisor-bugs by Leveraging the Hardware Virtualization Interface, 2024
- [MultiFuzz: A Multi-Stream Fuzzer For Testing Monolithic Firmware, 2024](https://www.usenix.org/system/files/usenixsecurity24-chesser.pdf)
- ResolverFuzz: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing, 2024
- SDFuzz: Target States Driven Directed Fuzzing, 2024
- [SHiFT: Semi-hosted Fuzz Testing for Embedded Applications, 2024](https://www.usenix.org/system/files/usenixsecurity24-mera.pdf)
- [Towards Generic Database Management System Fuzzing, 2024](https://www.usenix.org/system/files/usenixsecurity24-yang-yupeng.pdf)
- WhisperFuzz: White-Box Fuzzing for Detecting and Locating Timing Vulnerabilities in Processors, 2024
</details>
<details><summary>2023 (19 papers)</summary>
- AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering, 2023
- autofz: Automated Fuzzer Composition at Runtime, 2023
- Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation, 2023
- Automated Exploitable Heap Layout Generation for Heap Overflows Through Manipulation Distance-Guided Fuzzing, 2023
- Bleem: Packet Sequence Oriented Fuzzing for Protocol Implementations, 2023
- BoKASAN: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing, 2023
- CarpetFuzz: Automatic Program Option Constraint Extraction from Documentation for Fuzzing, 2023
- [DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing, 2023](https://www.usenix.org/system/files/usenixsecurity23-yuan-ming.pdf)
- [DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation, 2023](https://www.usenix.org/system/files/usenixsecurity23-jiang-zu-ming.pdf)
- Forming Faster Firmware Fuzzers, 2023
- [FuzzJIT: Oracle-Enhanced Fuzzing for JavaScript Engine JIT Compiler, 2023](https://www.usenix.org/system/files/usenixsecurity23-wang-junjie.pdf)
- Fuzztruction: Using Fault Injection-based Fuzzing to Leverage Implicit Domain Knowledge, 2023
- [GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation, 2023](https://www.usenix.org/system/files/usenixsecurity23-peng.pdf)
- Intender: Fuzzing Intent-Based Networking with Intent-State Transition Guidance, 2023
- KextFuzz: Fuzzing macOS Kernel EXTensions on Apple Silicon via Exploiting Mitigations, 2023
- [MINER: A Hybrid Data-Driven Approach for REST API Fuzzing, 2023](https://www.usenix.org/system/files/usenixsecurity23-lyu.pdf)
- MorFuzz: Fuzzing Processor via Runtime Instruction Morphing enhanced Synchronizable Co-simulation, 2023
- MTSan: A Feasible and Practical Memory Sanitizer for Fuzzing COTS Binaries, 2023
- PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems, 2023
</details>
<details><summary>2022 (14 papers)</summary>
- [StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing, 2022](https://www.usenix.org/system/files/sec22-zhao-bodong.pdf)
- [FIXREVERTER: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing, 2022](https://www.usenix.org/system/files/sec22-zhang-zenong.pdf)
- SGXFuzz: Efficiently Synthesizing Nested Structures for SGX Enclave Fuzzing, 2022
- AmpFuzz: Fuzzing for Amplification DDoS Vulnerabilities, 2022
- Stateful Greybox Fuzzing, 2022
- BrakTooth: Causing Havoc on Bluetooth Link Manager via Directed Fuzzing, 2022
- Fuzzing Hardware Like Software, 2022
- Drifuzz: Harvesting Bugs in Device Drivers from Golden Seeds, 2022
- FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing, 2022
- TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities, 2022
- [MundoFuzz: Hypervisor Fuzzing with Statistical Coverage Testing and Grammar Inference, 2022](https://www.usenix.org/system/files/sec22-myung.pdf)
- Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing, 2022
- [SyzScope: Revealing High-Risk Security Impacts of Fuzzer-Exposed Bugs in Linux kernel, 2022](https://www.usenix.org/system/files/sec22-zou.pdf)
- Morphuzz: Bending (Input) Space to Fuzz Virtual Devices, 2022
</details>
<details><summary>2021 (6 papers)</summary>
- Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing, 2021
- ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications, 2021
- Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing, 2021
- Constraint-guided Directed Greybox Fuzzing, 2021
- Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types, 2021
- UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers, 2021
</details>
<details><summary>2020 (10 papers)</summary>
- [FANS: Fuzzing Android Native System Services via Automated Interface Analysis, 2020](https://www.usenix.org/conference/usenixsecurity20/presentation/liu)
- Analysis of DTLS Implementations Using Protocol State Fuzzing, 2020
- EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit, 2020
- Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection, 2020
- FuzzGen: Automatic Fuzzer Generation, 2020
- ParmeSan: Sanitizer-guided Greybox Fuzzing, 2020
- SpecFuzz: Bringing Spectre-type vulnerabilities to the surface, 2020
- [FuzzGuard: Filtering out Unreachable Inputs in Directed Grey-box Fuzzing through Deep Learning, 2020](https://www.usenix.org/conference/usenixsecurity20/presentation/zong)
- [Montage: A Neural Network Language Model-Guided JavaScript Engine Fuzzer, 2020](https://www.usenix.org/conference/usenixsecurity20/presentation/lee-suyoung)
- GREYONE: Data Flow Sensitive Fuzzing, 2020
</details>
<details><summary>2019 (2 papers)</summary>
- Fuzzification: Anti-Fuzzing Techniques, 2019
- AntiFuzz: Impeding Fuzzing Audits of Binary Executables, 2019
</details>
<details><summary>2018 (3 papers)</summary>
- Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems, 2018
- [MoonShine: Optimizing OS Fuzzer Seed Selection with Trace Distillation, 2018](https://www.usenix.org/conference/usenixsecurity18/presentation/pailoor)
- QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing, 2018
</details>
<details><summary>2017 (2 papers)</summary>
- OSS-Fuzz - Google's continuous fuzzing service for open source software, 2017
- kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels, 2017
</details>
<details><summary>2015 (1 paper)</summary>
</details>
<details><summary>2014 (1 paper)</summary>
- [Optimizing Seed Selection for Fuzzing, 2014](https://softsec.kaist.ac.kr/~sangkilc/papers/rebert-usenixsec14.pdf)
</details>
<details><summary>2013 (1 paper)</summary>
</details>
<details><summary>2012 (1 paper)</summary>
</details>
ACM Conference on Computer and Communications Security (ACM CCS)
<details><summary>2025 (11 papers)</summary>
- A Qualitative Analysis of Fuzzer Usability and Challenges, 2025
- [ConTest: Taming the Cyber-physical Input Space in Fuzz Testing with Control Theory, 2025](https://dl.acm.org/doi/10.1145/3719027.3765129)
- DiveFuzz: Enhancing CPU Fuzzing via Diverse Instruction Construction, 2025
- [Error Messages to Fuzzing: Detecting XPS Parsing Vulnerabilities in Windows Printing Components, 2025](https://dl.acm.org/doi/10.1145/3719027.3744807)
- Fuzzing Processing Pipelines for Zero-Knowledge Circuits, 2025
- [Intent-aware Fuzzing for Android Hardened Application, 2025](https://dl.acm.org/doi/10.1145/3719027.3744858)
- PromeFuzz: A Knowledge-Driven Approach to Fuzzing Harness Generation with Large Language Models, 2025
- [Protocol-Aware Firmware Rehosting for Effective Fuzzing of Embedded Network Stacks, 2025](https://dl.acm.org/doi/10.1145/3719027.3765125)
- RVISmith: Fuzzing Compilers for RVV Intrinsics, 2025
- SyzParam: Incorporating Runtime Parameters into Kernel Driver Fuzzing, 2025
- [SyzSpec: Specification Generation for Linux Kernel Fuzzing via Under-Constrained Symbolic Execution, 2025](https://dl.acm.org/doi/10.1145/3719027.3744811)
</details>
<details><summary>2024 (19 papers)</summary>
- [Collapse Like A House of Cards: Hacking Building Automation System Through Fuzzing, 2024](https://dl.acm.org/doi/10.1145/3658644.3690216)
- [CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel, 2024](https://dl.acm.org/doi/10.1145/3658644.3690320)
- CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon, 2024
- [DarthShader: Fuzzing WebGPU Shader Translators & Compilers, 2024](https://dl.acm.org/doi/10.1145/3658644.3690209)
- FOX: Coverage-guided Fuzzing as Online Stochastic Control, 2024
- Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing, 2024
- FuzzCache: Optimizing Web Application Fuzzing Through Software-Based Data Cache, 2024
- [Fuzzing JavaScript Engines with a Graph-based IR, 2024](https://dl.acm.org/doi/10.1145/3658644.3690336)
- Leveraging Binary Coverage for Effective Generation Guidance in Kernel Fuzzing, 2024
- LIFTFUZZ: Validating Binary Lifters through Context-aware Fuzzing with GPT, 2024
- No Peer, no Cry: Network Application Fuzzing via Fault Injection, 2024
- On Understanding and Forecasting Fuzzers Performance with Static Analysis, 2024
- OSmart: Whitebox Program Option Fuzzing, 2024
- Program Environment Fuzzing, 2024
- Prompt Fuzzing for Fuzz Driver Generation, 2024
- ProphetFuzz: Fully Automated Prediction and Fuzzing of High-Risk Option Combinations with Only Documentation via Large Language Model, 2024
- [RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces, 2024](https://dl.acm.org/doi/10.1145/3658644.3670320)
- RIoTFuzzer: Companion App Assisted Remote Fuzzing for Detecting Vulnerabilities in IoT Devices, 2024
- [Toss a Fault to BpfChecker: Revealing Implementation Flaws for eBPF runtimes with Differential Fuzzing, 2024](https://dl.acm.org/doi/10.1145/3658644.3690237)
</details>
<details><summary>2023 (9 papers)</summary>
- DSFuzz: Detecting Deep State Bugs with Dependent State Exploration, 2023
- Fuzz on the Beach: Fuzzing Solana Smart Contracts, 2023
- Greybox Fuzzing of Distributed Systems, 2023
- Hopper: Interpretative Fuzzing for Libraries, 2023
- [Lifting Network Protocol Implementation to Precise Format Specification with Security Applications, 2023](https://dl.acm.org/doi/10.1145/3576915.3616614)
- NestFuzz: Enhancing Fuzzing with Comprehensive Understanding of Input Processing Logic, 2023
- Profile-guided System Optimizations for Accelerated Greybox Fuzzing, 2023
- [PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing, 2023](https://dl.acm.org/doi/10.1145/3576915.3623166)
- [SyzDirect: Directed Greybox Fuzzing for Linux Kernel, 2023](https://dl.acm.org/doi/10.1145/3576915.3623146)
</details>
<details><summary>2022 (6 papers)</summary>
- [SpecDoctor: Differential Fuzz Testing to Find Transient Execution Vulnerabilities, 2022](https://compsec.snu.ac.kr/papers/jaewon-specdoctor.pdf)
- SFuzz: Slice-based Fuzzing for Real-Time Operating Systems, 2022
- MC^2: Rigorous and Efficient Directed Greybox Fuzzing, 2022
- LibAFL: A Framework to Build Modular and Reusable Fuzzers, 2022
- [JIT-Picking: Differential Fuzzing of JavaScript Engines, 2022](https://publications.cispa.saarland/3773/1/2022-CCS-JIT-Fuzzing.pdf)
- DriveFuzz: Discovering Autonomous Driving Bugs through Driving Quality-Guided Fuzzing, 2022
</details>
<details><summary>2021 (8 papers)</summary>
- [SoFi: Reflection-Augmented Fuzzing for JavaScript Engines, 2021](https://dl.acm.org/doi/pdf/10.1145/3460120.3484823)
- T-Reqs: HTTP Request Smuggling with Differential Fuzzing, 2021
- V-SHUTTLE: Scalable and Semantics-Aware Hypervisor Fuzzing, 2021
- [Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing, 2021](https://people.cs.vt.edu/snagy2/papers/21CCS.pdf)
- HyperFuzzer: An Efficient Hybrid Fuzzer For Virtual CPUs, 2021
- Regression Greybox Fuzzing, 2021
- Hardware Support to Improve Fuzzing Performance and Precision, 2021
- SNIPUZZ: Black-box Fuzzing of IoT Firmware via Message Snippet Inference, 2021
</details>
<details><summary>2020 (1 paper)</summary>
</details>
<details><summary>2019 (3 papers)</summary>
- Intriguer: Field-Level Constraint Solving for Hybrid Fuzzing, 2019
- Learning to Fuzz from Symbolic Execution with Application to Smart Contracts, 2019
- Matryoshka: fuzzing deeply nested branches, 2019
</details>
<details><summary>2018 (2 papers)</summary>
truncated — full list on GitHub