ICSE 2025 (series) / SBFT 2025 (series) / SBFT 2025 /
On Evaluating Fuzzers with Context-Sensitive Fuzzed Inputs: A Case Study on PKCS#1-v1.5
Mon 28 Apr 2025 12:15 - 12:30 at 104 - Keynote 2 and Paper Presentations 1 Chair(s): Vincenzo Riccio
Cryptographic standards like the PKCS#1-v1.5 signature scheme for RSA are essential for secure digital communications, yet cryptographic libraries remain vulnerable. Fuzzing, a security testing technique, often struggles to detect memory-safety bugs in these libraries due to the need for context-sensitive inputs—those with complex semantic relationships between their fields. This paper presents a preliminary study that evaluates 7 uzzers for their ability to generate such inputs across 5 libraries implementing the PKCS#1-v1.5 signature verification scheme. Our findings reveal performance variations among the fuzzers and highlight their limitations with context-sensitive inputs.
Mon 28 AprDisplayed time zone: Eastern Time (US & Canada) change
Mon 28 Apr
Displayed time zone: Eastern Time (US & Canada) change
11:00 - 12:30 | |||
11:00 60mKeynote | Keynote by Marcel Böhme SBFT Marcel Böhme MPI for Security and Privacy | ||
12:00 15mResearch paper | DeepUIFuzz: A Guided Fuzzing Strategy for Testing UI Component Detection Models SBFT Proma Chowdhury University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka | ||
12:15 15mResearch paper | On Evaluating Fuzzers with Context-Sensitive Fuzzed Inputs: A Case Study on PKCS#1-v1.5 SBFT S Mahmudul Hasan Syracuse University, Polina Kozyreva Syracuse University, Endadul Hoque Syracuse University |