{"title":"Survey of network protocol fuzzers: Taxonomy, techniques, and directions","authors":"Chaoyang Zheng, Yunchao Wang, Huihui Huang, Yunfeng Wang, Haowen Chen, Qiang Wei","doi":"10.1016/j.cose.2025.104683","DOIUrl":null,"url":null,"abstract":"<div><div>Fuzzing has become widely adopted for network protocol vulnerability detection due to its high degree of automation and minimal reliance on domain-specific knowledge. Given the distinct characteristics of network protocol programs compared to general targets, researchers have proposed numerous innovative solutions to address the technical challenges. However, there remains a lack of thorough investigation that provide in-depth technical analysis and comprehensive summarization of these advancements, as well as a clear taxonomy to guide future research directions. To bridge this gap, this study conducts a systematic review of network protocol fuzzing and proposes a novel framework with four core modules abstracted from protocol fuzzer architectures. We analyze the key technologies in each module, discussing their advantages, limitations, and application scenarios. More significantly, this work establishes a novel taxonomy defining four fundamental capability dimensions, each addressing distinct practical challenges in protocol fuzzing. Using this framework, we conduct the systematic classification and comparative analysis of existing techniques. Our work contributes theoretical insights and practical guidance for network protocol fuzzing development.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"159 ","pages":"Article 104683"},"PeriodicalIF":5.4000,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003724","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Fuzzing has become widely adopted for network protocol vulnerability detection due to its high degree of automation and minimal reliance on domain-specific knowledge. Given the distinct characteristics of network protocol programs compared to general targets, researchers have proposed numerous innovative solutions to address the technical challenges. However, there remains a lack of thorough investigation that provide in-depth technical analysis and comprehensive summarization of these advancements, as well as a clear taxonomy to guide future research directions. To bridge this gap, this study conducts a systematic review of network protocol fuzzing and proposes a novel framework with four core modules abstracted from protocol fuzzer architectures. We analyze the key technologies in each module, discussing their advantages, limitations, and application scenarios. More significantly, this work establishes a novel taxonomy defining four fundamental capability dimensions, each addressing distinct practical challenges in protocol fuzzing. Using this framework, we conduct the systematic classification and comparative analysis of existing techniques. Our work contributes theoretical insights and practical guidance for network protocol fuzzing development.
期刊介绍:
Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world.
Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.