Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

AI-Powered Fuzzing Enhances Bug Detection

August 18, 2023
Reading Time: 2 mins read
in News

 

Google has integrated the power of artificial intelligence into its open source fuzz testing framework, showcasing a transformative potential in the realm of bug-hunting.

By introducing generative-AI technology to its OSS-FUZZ project, which offers free fuzzers for open source projects and privately alerts developers about detected bugs, Google has achieved significant advancements in code coverage. Leveraging large language model (LLM) algorithms for the creation of new fuzz targets, Google observed remarkable outcomes in terms of code coverage improvement.

Incorporating LLMs into the fuzz testing process enables the augmentation of code coverage for critical projects within Google’s OSS-Fuzz service without necessitating manual code writing. This groundbreaking approach not only enhances the security of over 1,000 fuzzed projects but also paves the way for the wider adoption of fuzzing in future endeavors.

Fuzz testers, or fuzzers, play a vital role in vulnerability research by subjecting applications to random inputs to expose potential security vulnerabilities. When vulnerabilities are detected, researchers can analyze the test outcomes to pinpoint the root cause of errors.

Traditionally, fuzzing entails substantial manual effort to construct fuzz targets and functions for testing various code segments. Google’s exploration of the viability of LLMs seeks to optimize the effectiveness of the six-year-old OSS-Fuzz service.

While OSS-Fuzz has successfully identified and verified fixes for more than 10,000 security bugs in open source software, the potential for discovering even more bugs through increased code coverage remains untapped. Despite its achievements, the fuzzing service currently covers only around 30% of an average open source project’s code, leaving a significant portion untouched by fuzzing.

To evaluate the feasibility of LLM-generated fuzz targets, Google’s software engineers developed an evaluation framework connecting OSS-Fuzz and LLMs. This framework facilitates the identification of under-fuzzed and high-potential sections of code within sample projects.

By employing LLMs to create new fuzz targets, Google witnessed substantial code coverage improvements ranging from 1.5% to 31% across various projects. For instance, in the case of the “tinyxml2” project, code coverage increased from 38% to 69% without human intervention.

The experiment revealed the potential of LLMs to autonomously generate functional targets that rediscover vulnerabilities previously overlooked by fuzzing. Google’s plans to open source the evaluation framework will provide researchers with the tools to test their own automatic fuzz target generation methods, further advancing the field of fuzz testing and bolstering software security.

Reference:
  • AI-Powered Fuzzing: Breaking the Bug Hunting Barrier
Tags: AIAugust 2023Cyber NewsCyber News 2023CyberattackCybersecurityfuzz testingGoogleopen sourceVulnerabilities
ADVERTISEMENT

Related Posts

AT&T Agrees to $177M Breach Settlement

AT&T Agrees to $177M Breach Settlement

July 8, 2025
AT&T Agrees to $177M Breach Settlement

Alleged Hafnium Hacker Arrested in Italy

July 8, 2025
AT&T Agrees to $177M Breach Settlement

Parrot OS 6.4 Adds New Hacking Tools

July 8, 2025
Insider Arrested in Brazil PIX System Hack

Insider Arrested in Brazil PIX System Hack

July 7, 2025
Insider Arrested in Brazil PIX System Hack

EU Plans Quantum Secure Network by 2030

July 7, 2025
Insider Arrested in Brazil PIX System Hack

Prime Day Scams Use 1000 Fake Amazon Sites

July 7, 2025

Latest Alerts

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Subscribe to our newsletter

    Latest Incidents

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial