• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2022, Vol. 44 ›› Issue (12): 2173-2186.

• Software Engineering • Previous Articles     Next Articles

Survey on fuzzy testing technologies

NIU Sheng-jie1,LI Peng2,ZHANG Yu-jie1,2   

  1. (1.School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023;
    2.Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210023,China)
  • Received:2021-08-17 Revised:2022-03-18 Accepted:2022-12-25 Online:2022-12-25 Published:2023-01-04

Abstract: As people pay more and more attention to software system security issues, fuzzy testing, as a security testing technology for security vulnerability detection, has become more and more widely used and more and more important due to its high degree of automation and low false alarm rate. After continuous improvement in recent years, fuzzy testing has achieved many achievements in both technical development and application innovation. Firstly, we briefly explain the related concepts and basic theories of fuzzing, summarize the application of fuzzy testing in various fields, and analyze the corresponding fuzzy testing solutions according to the needs of vulnerability mining in different fields. Then ,we focus on the important development results of fuzzy testing in recent years, including the improvement and innovation of testing tools, frameworks, systems, and methods. We also analyze and summarize the innovative methods and theories adopted by each development results, as well as the advantages and disadvantages of each tools and systems. Finally, from the perspectives of protocol reverse engineering application, cloud platform construction, emerging technology integration, fuzzy testing countermeasure technology research, and fuzzing tool integration, we provide direction reference for the further research of fuzzy testing.

Key words: fuzzy testing, vulnerability mining, software test, protocol test