Shuangxiang Kan (University of New South Wales), Xiao Cheng (Macquarie University), Yuekang Li (University of New South Wales)

Fuzz testing is a cornerstone technique for uncovering vulnerabilities and improving the reliability of software systems. Recent studies reveal that the primary bottleneck in modern coverage-guided fuzzing lies not within the fuzzers themselves, but in the construction of fuzz drivers—particularly their limited flexibility in exploring option parameters within library APIs. Existing approaches predominantly focus on mutating input data, often neglecting configuration options that fundamentally influence API behavior and may conceal critical vulnerabilities. To address this gap, we present MUTATO, a new multi-dimensional fuzz driver enhancement approach that systematically and adaptively mutates both input data and option parameters using a coverage-guided, epsilon-greedy strategy. Unlike prior work that requires intrusive modifications to fuzzers or targets only program-level options, MUTATO operates at the driver level, ensuring fuzzer-agnostic applicability and seamless integration with both manual and automatically generated drivers. We further introduce an option parameter fuzzing language (OPFL) to guide the enhancement of drivers. Extensive experiments on 10 widely used C/C++ libraries demonstrate that MUTATO-enhanced drivers achieve, on average, 14% and 13% higher code coverage compared to original AFL++ and LibFuzzer drivers, respectively, and uncover 12 previously unknown vulnerabilities, including 3 CVEs. Notably, we identified 4 vulnerabilities within 5 hours in APIs that OSS-Fuzz had failed to detect despite more than 18,060 hours of fuzzing effort.

View More Papers

Icarus: Achieving Performant Asynchronous BFT with Only Optimistic Paths

Xiaohai Dai (Huazhong University of Science and Technology), Yiming Yu (Huazhong University of Science and Technology), Sisi Duan (Tsinghua University), Rui Hao (Wuhan University of Technology), Jiang Xiao (Huazhong University of Science and Technology), Hai Jin (Huazhong University of Science and Technology)

Read More

TBTrackerX: Fantastic Trigger Bots and Where to Find Malicious...

Mohammad Majid Akhtar (University of New South Wales), Rahat Masood (University of New South Wales), Muhammad Ikram (Macquarie University), Salil S. Kanhere (University of New South Wales)

Read More

Enhancing Legal Document Security and Accessibility with TAF

Renata Vaderna (Independent Researcher), Dušan Nikolić (University of Novi Sad), Patrick Zielinski (New York University), David Greisen (Open Law Library), BJ Ard (University of Wisconsin–Madison), Justin Cappos (New York University)

Read More