ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2505.00289
24
0

PatchFuzz: Patch Fuzzing for JavaScript Engines

1 May 2025
Junjie Wang
Yuhan Ma
Xiaofei Xie
Xiaoning Du
Xiaotian Zhang
ArXivPDFHTML
Abstract

Patch fuzzing is a technique aimed at identifying vulnerabilities that arise from newly patched code. While researchers have made efforts to apply patch fuzzing to testing JavaScript engines with considerable success, these efforts have been limited to using ordinary test cases or publicly available vulnerability PoCs (Proof of Concepts) as seeds, and the sustainability of these approaches is hindered by the challenges associated with automating the PoC collection. To address these limitations, we propose an end-to-end sustainable approach for JavaScript engine patch fuzzing, named PatchFuzz. It automates the collection of PoCs of a broader range of historical vulnerabilities and leverages both the PoCs and their corresponding patches to uncover new vulnerabilities more effectively. PatchFuzz starts by recognizing git commits which intend to fix security bugs. Subsequently, it extracts and processes PoCs from these commits to form the seeds for fuzzing, while utilizing code revisions to focus limited fuzzing resources on the more vulnerable code areas through selective instrumentation. The mutation strategy of PatchFuzz is also optimized to maximize the potential of the PoCs. Experimental results demonstrate the effectiveness of PatchFuzz. Notably, 54 bugs across six popular JavaScript engines have been exposed and a total of 62,500bountieshasbeenreceived.62,500 bounties has been received.62,500bountieshasbeenreceived.

View on arXiv
@article{wang2025_2505.00289,
  title={ PatchFuzz: Patch Fuzzing for JavaScript Engines },
  author={ Junjie Wang and Yuhan Ma and Xiaofei Xie and Xiaoning Du and Xiangwei Zhang },
  journal={arXiv preprint arXiv:2505.00289},
  year={ 2025 }
}
Comments on this paper