#FUZZING'26 CALL FOR PAPERS
──────
✨ After 5 years, we will be again co-located with NDSS!
🔗 fuzzing-workshop.github.io
📅 11. Dec (Submission)
//cc @mboehme.bsky.social (MPI-SP), @ruijiemeng.bsky.social (CISPA), @rohan.padhye.org (CMU), László Szekeres (Google)
08.10.2025 12:02 — 👍 9 🔁 4 💬 0 📌 2
But only if we like the domain of your email address.
26.10.2025 16:29 — 👍 4 🔁 0 💬 0 📌 0
What the hell are we doing? · Addison Crump
Homepage for Addison Crump
Must-read for fuzzing folks (read: tooling/algorithms/academia) by Addison Crump
addisoncrump.info/research/wha...
26.10.2025 03:16 — 👍 30 🔁 10 💬 1 📌 1
drops.dagstuhl.de/storage/01oa...
can we get this builtin in lldb please?
21.09.2025 08:54 — 👍 2 🔁 0 💬 0 📌 0
cut my heap into pieces, this is my crash report:
allocation, no alignment
don't give a fuck if it faults on assignment
this is fatal abort()
31.05.2025 17:26 — 👍 442 🔁 77 💬 6 📌 0
I love this. I've been using dwarf data for a while now (I think the design space of "you have source, but you'd rather do binary analysis with dwarf on debug builds"-tools is kinda under explored). But I never treated dwarf as a database format to safe results in.
27.05.2025 23:40 — 👍 2 🔁 0 💬 0 📌 0
✈️ I'll be at @icseconf.bsky.social this week — find me if you'd like to chat about all things fuzzing / binary analysis!
28.04.2025 11:26 — 👍 3 🔁 1 💬 0 📌 0
SURE 2025 | The Workshop on Software Understanding and Reverse Engineering
The Workshop on Software Understanding and Reverse Engineering
I'm proud to announce that myself and @AtipriyaBajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. sure-workshop.org/
Please follow our workshop account @sureworkshop and RT it for visibility :).
25.04.2025 16:30 — 👍 7 🔁 6 💬 1 📌 0
Our paper "Top Score on the Wrong Exam" paper will be presented at #ISSTA25 🐣 in Trondheim!
📝https://mpi-softsec.github.io/papers/ISSTA25-topscore.pdf
🧑💻https://github.com/niklasrisse/TopScoreWrongExam
// @nrisse.bsky.social @fuzzing.bsky.social
24.04.2025 14:09 — 👍 20 🔁 5 💬 1 📌 0
As it turns out, the C compiler orphan-crushing machine offers no benefit: web.ist.utl.pt/nuno.lopes/p...
22.04.2025 20:37 — 👍 9 🔁 3 💬 0 📌 0
Seems like Atropos does most of that too - i.e. automatically inferring some kind of "spec" in a way - it just doesn't use OpenAPI, I think? (except for also having coverage feedback & snapshot).
18.04.2025 04:29 — 👍 1 🔁 0 💬 2 📌 0
What's the delta between this and Atropos? Not limited to PHP?
18.04.2025 01:28 — 👍 4 🔁 0 💬 1 📌 0
Have been making the exact same experience - tried very hard to use perplexity pro for a couple of days, hardly ever found a problem easy enough for the AI to solve, with some outlandishly easy things failing even on claude etc.
24.03.2025 22:29 — 👍 0 🔁 0 💬 2 📌 0
futures.cs.utah.edu/papers/25ICS... by @snagycs.bsky.social and @gabriel-sherman.bsky.social Seems like a very sensible approach to harness generation with some impressive results. I'm looking forward to seeing more discussion about this approach :) (sorry for blatantly copying the twitter thing).
18.03.2025 03:13 — 👍 11 🔁 1 💬 0 📌 0
Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities | USENIXusenix_logo_notag_white
Now, if someone combines this paper with www.usenix.org/conference/u... (which already some similar stuff) I would totally expect that fuzzing outperforms static analysis on web-app security issues just as harshly as we know it to outperform static analysis on the native side.
04.03.2025 05:09 — 👍 3 🔁 0 💬 0 📌 0
Just earlier today I was talking to someone how we are missing out A LOT of power from dynamic language reflection/introspection capabilities in fuzzing, and then I saw this paper: nebelwelt.net/publications... - great timing & work @gannimo.bsky.social!
04.03.2025 05:01 — 👍 5 🔁 1 💬 1 📌 0
Next thing: a bunch of 'em go all "shocked pikatchu"over the realisation that there's a ton of ADHD and/or Autistic folks in CS 🤣
26.02.2025 05:24 — 👍 2 🔁 0 💬 0 📌 0
And those that aren't, are usually friends with quite a few of those that are ...
26.02.2025 04:14 — 👍 1 🔁 0 💬 1 📌 0
Leude geht wählen.
Vote whatever Elon didn't endorse
23.02.2025 11:55 — 👍 4 🔁 1 💬 0 📌 0
Check out ghostcell: plv.mpi-sws.org/rustbelt/gho... with the presentation: www.youtube.com/watch?v=jIbu... for a way to make 0 overhead, proven safe, cyclic datastructures with actual references in rust.
22.02.2025 20:08 — 👍 13 🔁 1 💬 0 📌 0
I’m very excited to announce that we at V8 Security have finally published our first version of Fuzzilli that understands Wasm!
Go check it out at https://github.com/googleprojectzero/fuzzilli.
While we still have a way to go in improving it, we think it shows a promising approach!
04.02.2025 19:34 — 👍 31 🔁 16 💬 1 📌 1
AIScholar - Paper Database
aischolar.0x434b.dev Pretty cool project by @434b.bsky.social: A neat web interface to explore security (and in particular: Fuzzing) papers with AI summaries. Seems super useful to get/stay up to date with recent papers :)
04.02.2025 15:29 — 👍 10 🔁 6 💬 0 📌 0
I got Linux running in a PDF file using a RISC-V emulator.
PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.
linux.doompdf.dev/linux.pdf
github.com/ading2210/li...
31.01.2025 20:02 — 👍 313 🔁 129 💬 12 📌 22
I.e. I think one of the reasons fuzzing based taint hasn't been explored more widely in academia is that if you measure taint label accuracy on all variables, to compare against existing approaches, the result will be atrocious. You'd need to use it in a bigger bug finding pipeline to make sense.
29.01.2025 01:59 — 👍 0 🔁 0 💬 0 📌 0
I am eminently qualified to speak from experience about a variety of dumpster fires.
ICS DFIR at Dragos, martial artist, marksman, humanist, level 14 Neutral Good rogue, USAF retired. I post *very serious* things about infosec. Thoughts my own. Enby. 🏳️🌈
Computer Science professor at CMU. Doing research on automated software testing and bug finding. https://rohan.padhye.org
Incoming tenure-track faculty at CISPA | PhD at NUS | Software Security
https://mengrj.github.io/
Computer Security PhD student@UCSB Seclab | Binary tamer | hacking@shellphish
The Workshop on Software Understanding and Reverse Engineering (SURE). Co-located at ACM CCS 2025 in Taiwan. https://sure-workshop.org/
Principal Researcher and Co-founder at Diligence Security, previously at Consensys, ETH Zürich, UT Austin, Microsoft Research, and Google
Ph.D. Student at the University of Utah | Computer Security
https://gabe-sherman.github.io/
Faculty @utah.edu.
My lab hunts bugs: https://futures.cs.utah.edu/bugs.
Mastodon: snagy@infosec.exchange
Twitter: @snagycs
Binary Security Researcher, Chief Scientist at http://emproof.com and Trainer.
Website: https://synthesis.to
I like computering. Doing security research at @rapid7 labs.
This is a professional account. Used to play a lot of CTF with @EatSleepPwnRpt and @StratumAuhuur
I'm a tempura shrimp and you can't catch me! | 🐢 Terrapin Attack | 🦙 ALPACA Attack | 🦝 Raccoon Attack | 😈 DEMONS Attack | @lambdafu@mastodon.social
Professor in Computer Security @EURECOM
Ex Defcon CTF organizer with @oooverflow
mobile security / symbolic execution . he / him
Currently: Edge Security @ MSFT
Previously: Chrome Security @ Google