Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation

In vulnerability detection, machine learning has been used as an effective static analysis technique, although it suffers from a significant rate of false positives. Contextually, in vulnerability discovery, fuzzing has been used as an effective dynamic analysis technique, although it requires manually writing fuzz drivers. Fuzz drivers usually target a limited subset of functions in a library that must be chosen according to certain criteria, e.g., the depth of a function, the number of paths. These criteria are verified by components called target oracles. In this work, we propose an automated fuzz driver generation workflow composed of: (1) identifying a likely vulnerable function by leveraging a machine learning for vulnerability detection model as a target oracle, (2) automatically generating fuzz drivers, (3) fuzzing the target function to find bugs which could confirm the vulnerability inferred by the target oracle. We show our method on an existing vulnerability in libgd, with a plan for large-scale evaluation.
View on arXiv@article{castiglione2025_2505.01123, title={ Poster: Machine Learning for Vulnerability Detection as Target Oracle in Automated Fuzz Driver Generation }, author={ Gianpietro Castiglione and Marcello Maugeri and Giampaolo Bella }, journal={arXiv preprint arXiv:2505.01123}, year={ 2025 } }