Survey of network protocol fuzzers: Taxonomy, techniques, and directions

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Chaoyang Zheng, Yunchao Wang, Huihui Huang, Yunfeng Wang, Haowen Chen, Qiang Wei
{"title":"Survey of network protocol fuzzers: Taxonomy, techniques, and directions","authors":"Chaoyang Zheng,&nbsp;Yunchao Wang,&nbsp;Huihui Huang,&nbsp;Yunfeng Wang,&nbsp;Haowen Chen,&nbsp;Qiang Wei","doi":"10.1016/j.cose.2025.104683","DOIUrl":null,"url":null,"abstract":"<div><div>Fuzzing has become widely adopted for network protocol vulnerability detection due to its high degree of automation and minimal reliance on domain-specific knowledge. Given the distinct characteristics of network protocol programs compared to general targets, researchers have proposed numerous innovative solutions to address the technical challenges. However, there remains a lack of thorough investigation that provide in-depth technical analysis and comprehensive summarization of these advancements, as well as a clear taxonomy to guide future research directions. To bridge this gap, this study conducts a systematic review of network protocol fuzzing and proposes a novel framework with four core modules abstracted from protocol fuzzer architectures. We analyze the key technologies in each module, discussing their advantages, limitations, and application scenarios. More significantly, this work establishes a novel taxonomy defining four fundamental capability dimensions, each addressing distinct practical challenges in protocol fuzzing. Using this framework, we conduct the systematic classification and comparative analysis of existing techniques. Our work contributes theoretical insights and practical guidance for network protocol fuzzing development.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104683"},"PeriodicalIF":5.4000,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003724","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Fuzzing has become widely adopted for network protocol vulnerability detection due to its high degree of automation and minimal reliance on domain-specific knowledge. Given the distinct characteristics of network protocol programs compared to general targets, researchers have proposed numerous innovative solutions to address the technical challenges. However, there remains a lack of thorough investigation that provide in-depth technical analysis and comprehensive summarization of these advancements, as well as a clear taxonomy to guide future research directions. To bridge this gap, this study conducts a systematic review of network protocol fuzzing and proposes a novel framework with four core modules abstracted from protocol fuzzer architectures. We analyze the key technologies in each module, discussing their advantages, limitations, and application scenarios. More significantly, this work establishes a novel taxonomy defining four fundamental capability dimensions, each addressing distinct practical challenges in protocol fuzzing. Using this framework, we conduct the systematic classification and comparative analysis of existing techniques. Our work contributes theoretical insights and practical guidance for network protocol fuzzing development.
网络协议模糊器综述:分类、技术和方向
模糊测试因其自动化程度高、对特定领域知识依赖少而被广泛应用于网络协议漏洞检测。考虑到网络协议程序与一般目标相比的独特特征,研究人员提出了许多创新的解决方案来应对技术挑战。然而,目前还缺乏深入的研究,对这些进展进行深入的技术分析和全面的总结,以及明确的分类来指导未来的研究方向。为了弥补这一差距,本研究对网络协议模糊测试进行了系统回顾,并提出了一个从协议模糊测试架构中抽象出四个核心模块的新框架。我们分析了每个模块中的关键技术,讨论了它们的优势、局限性和应用场景。更重要的是,这项工作建立了一个新的分类法,定义了四个基本的能力维度,每个维度都解决了协议模糊测试中不同的实际挑战。在此框架下,对现有技术进行了系统的分类和比较分析。我们的工作为网络协议模糊测试的发展提供了理论见解和实践指导。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信