Fuzzing

repo: cpuu/awesome-fuzzing
category: Security related: Testing


Awesome Fuzzing Awesome

Fuzzing or fuzz testing is an automated software testing technique that involves providing invalid, unexpected, or random data as inputs to a computer program. The program is then monitored for exceptions such as crashes, failing built-in code assertions, or potential memory leaks. Typically, fuzzers are used to test programs that take structured inputs.

A curated list of references to awesome Fuzzing for security testing. Additionally there is a collection of freely available academic papers, tools and so on.

Your favorite tool or your own paper is not listed? Fork and create a Pull Request to add it!

Contents

Books

Talks

Papers

To achieve a well-defined scope, I have chosen to include publications on fuzzing from 4 top major security conferences (2008–2025): (i) Network and Distributed System Security Symposium (NDSS), (ii) IEEE Symposium on Security and Privacy (S&P), (iii) USENIX Security Symposium (USEC), and (iv) ACM Conference on Computer and Communications Security (CCS).

Note: Papers are selected based on whether the title contains the keyword "fuzz." If a paper is related to fuzzing but does not include "fuzz" in its title, it may have been missed. In that case, please open a Pull Request and it will be reviewed for inclusion.

The Network and Distributed System Security Symposium (NDSS)

<details><summary>2025 (10 papers)</summary>

</details>

<details><summary>2024 (7 papers)</summary>

</details>

<details><summary>2023 (4 papers)</summary>

</details>

<details><summary>2022 (4 papers)</summary>

</details>

<details><summary>2021 (4 papers)</summary>

  • [WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning, 2021](https://taesoo.kim/pubs/2021/jung:winnie.pdf)
  • [Reinforcement Learning-based Hierarchical Seed Scheduling for Greybox Fuzzing, 2021](https://www.cs.ucr.edu/~heng/pubs/afl-hier.pdf)
  • PGFUZZ: Policy-Guided Fuzzing for Robotic Vehicles, 2021
  • [Favocado: Fuzzing Binding Code of JavaScript Engines Using Semantically Correct Test Cases, 2021](https://www.ndss-symposium.org/wp-content/uploads/ndss2021_6A-2_24224_paper.pdf)

</details>

<details><summary>2020 (4 papers)</summary>

</details>

<details><summary>2019 (5 papers)</summary>

</details>

<details><summary>2018 (4 papers)</summary>

</details>

<details><summary>2017 (2 papers)</summary>

</details>

<details><summary>2016 (1 paper)</summary>

</details>

<details><summary>2008 (1 paper)</summary>

  • [Automated Whitebox Fuzz Testing, 2008](https://www.ndss-symposium.org/wp-content/uploads/2017/09/Automated-Whitebox-Fuzz-Testing-paper-Patrice-Godefroid.pdf)

</details>

IEEE Symposium on Security and Privacy (IEEE S&P)

<details><summary>2025 (7 papers)</summary>

</details>

<details><summary>2024 (14 papers)</summary>

</details>

<details><summary>2023 (10 papers)</summary>

</details>

<details><summary>2022 (5 papers)</summary>

</details>

<details><summary>2021 (5 papers)</summary>

</details>

<details><summary>2020 (5 papers)</summary>

</details>

<details><summary>2019 (4 papers)</summary>

</details>

<details><summary>2018 (3 papers)</summary>

</details>

<details><summary>2017 (1 paper)</summary>

  • [Skyfire: Data-Driven Seed Generation for Fuzzing, 2017](https://www.ieee-security.org/TC/SP2017/papers/42.pdf)

</details>

<details><summary>2015 (1 paper)</summary>

</details>

<details><summary>2010 (1 paper)</summary>

</details>

USENIX Security

<details><summary>2025 (14 papers)</summary>

</details>

<details><summary>2024 (12 papers)</summary>

</details>

<details><summary>2023 (19 papers)</summary>

</details>

<details><summary>2022 (14 papers)</summary>

</details>

<details><summary>2021 (6 papers)</summary>

</details>

<details><summary>2020 (10 papers)</summary>

</details>

<details><summary>2019 (2 papers)</summary>

</details>

<details><summary>2018 (3 papers)</summary>

</details>

<details><summary>2017 (2 papers)</summary>

</details>

<details><summary>2015 (1 paper)</summary>

</details>

<details><summary>2014 (1 paper)</summary>

  • [Optimizing Seed Selection for Fuzzing, 2014](https://softsec.kaist.ac.kr/~sangkilc/papers/rebert-usenixsec14.pdf)

</details>

<details><summary>2013 (1 paper)</summary>

</details>

<details><summary>2012 (1 paper)</summary>

</details>

ACM Conference on Computer and Communications Security (ACM CCS)

<details><summary>2025 (11 papers)</summary>

</details>

<details><summary>2024 (19 papers)</summary>

</details>

<details><summary>2023 (9 papers)</summary>

</details>

<details><summary>2022 (6 papers)</summary>

</details>

<details><summary>2021 (8 papers)</summary>

</details>

<details><summary>2020 (1 paper)</summary>

</details>

<details><summary>2019 (3 papers)</summary>

</details>

<details><summary>2018 (2 papers)</summary>


truncated — full list on GitHub

[[curator]]
I'm the Curator. I can help you navigate, organize, and curate this wiki. What would you like to do?