%A ZHANG Xiong and LI Zhou-jun %T Survey of Fuzz Testing Technology %0 Journal Article %D 2016 %J Computer Science %R 10.11896/j.issn.1002-137X.2016.05.001 %P 1-8 %V 43 %N 5 %U {https://www.jsjkx.com/CN/abstract/article_16032.shtml} %8 2018-12-01 %X Security vulnerabilities in software may lead to serious consequences,and vulnerability exploiting has become a hot area of research in network and information security.Popular vulnerability exploiting technologies include static analysis,dynamic analysis,binary code comparison,fuzz testing and so on.Along with the expansion of the scale and complexity of software,fuzz testing has incomparable advantages which other vulnerability exploiting technology can’t provide.Firstly,both advantages and disadvantages of various vulnerability exploiting technology are discussed.Second-ly,an account of the research advances of fuzz testing the procedure of fuzz testing and test case generation technology were described in detail.Finally,the applications of fuzz testing were shown and the trend of future study was discussed.