BGPFuzz: Automated Configuration Fuzzing of the Border Gateway Protocol

https://arxiv.org/abs/2512.05358

#BGP #FuzzTesting
BGPFuzz: Automated Configuration Fuzzing of the Border Gateway Protocol

Telecommunications networks rely on configurations to define routing behavior, especially in the Border Gateway Protocol (BGP), where misconfigurations can lead to severe outages and security breaches, as demonstrated by the 2021 Facebook outage. Unlike existing approaches that rely on synthesis or verification, our work offers a cost-effective method for identifying misconfigurations resulting from BGP's inherent complexity or vendor-specific implementations. We present BGPFuzz, a structure-aware and stateful fuzzing framework that systematically mutates BGP configurations and evaluates their effects in virtualized network. Without requiring predefined correctness properties as in static analysis, BGPFuzz detects anomalies through runtime oracles that capture practical symptoms such as session resets, blackholing, and traffic redirection. Our experiments show that BGPFuzz can reliably reproduce and detect known failures, including max-prefix violations and sub-prefix hijacks.

arXiv.org
Getting Started With Fuzz Testing in CLion | The CLion Blog

Learn how to perform fuzz testing with CI Fuzz in CLion, analyze the results, and debug a tested function.

The JetBrains Blog

#Fuzzing along in #CSVDiff  

In the second screenshot I've highlighted some interesting parts:

Key field indices are 2 and 3, so when diffing the records, where key fields are highlighted, they'll be compared as `Modify`, because:
- key fields are equal between left and right record
- other fields are unequal between left and right record

The other two records on the right have no corresponding left record - so those are `Add`ed records

#Rust #FuzzTesting #RustLang #PropertyTesting

Wow, #FuzzTesting/ #PropertyTesting is actually harder than doing an automatic proof.๐Ÿ˜“

I didn't expect that!๐Ÿ˜ฎ

#SoftwareEngineering #Unexpected #Testing #FormalVerification

Ah yes, another thrilling installment of "Look Ma, I Wrote a Parser" ๐Ÿค“โœจ. Because in the thrilling world of 3D graphics, nothing screams excitement quite like reinventing a wheel that nobody's using ๐Ÿš€. But hey, at least it's robust-ishโ€”fuzz testing can relax now ๐Ÿ˜ด.
https://nullprogram.com/blog/2025/03/02/ #3Dgraphics #ParserDevelopment #SoftwareEngineering #FuzzTesting #TechHumor #HackerNews #ngated
Robust Wavefront OBJ model parsing in C

https://ha.nnes.dev/blog/fuzzing-is-fun/

I tried #fuzzing and really enjoyed it, so I wrote a blogpost about it! It mentions some #RocLang stuff, but you don't need to know any Roc to read it :)

#blogpost #testing #fuzztesting

Fuzzing is fun - Ha.nnes.dev

I like the fact American Fuzzy Lop can be halted and resumed, because I really don't need to have a desktop machine rumbling away in the bedroom while I sleep.

But after 12h12m01s it has so far found zero crashes and zero hangs. So either my XML parser is great at avoiding panics, or my fuzzing method is testing some no-op action. (Though, while I was writing this, it found another path of interest through the executable, so it's doing something.)

#FuzzTesting #Rust #RustLang #AmericanFuzzyLop

๐Ÿ”“ Unlock the power of #FuzzTesting in "Practical Web Browser Fuzzing", a #cybersecurity #training by Patrick Ventuzelo! Understand web browser architecture, setup testing environments, and apply #fuzzing to find critical #vulnerabilities. Get your ticket now!

๐ŸŽŸ๏ธ https://ringzer0.training/trainings/browser-fuzzing.html

Ringzer0 - Practical Web Browser Fuzzing

This course will give you all the prerequisites to understand modern web browsers' architecture and significant components. You will discover and fuzz the main browser components such as DOM, JS engines, JIT compilers, WebAssembly, and IPC. You will learn how to use famous tools (Honggfuzz, Domato, Dharma, Fuzzilli, Afl++) and create your custom fuzzers to apply different fuzzing techniques (coverage-guided, grammar-based, in-process fuzzing) to find vulnerabilities/bugs.

๐Ÿ”“ Unlock the power of #FuzzTesting in "Practical Web Browser Fuzzing", a #cybersecurity #training by Patrick Ventuzelo! Understand web browser architecture, setup testing environments, and apply #fuzzing to find critical #vulnerabilities. Get your ticket now!

๐ŸŽŸ๏ธ https://ringzer0.training/trainings/browser-fuzzing.html

Ringzer0 - Practical Web Browser Fuzzing

This course will give you all the prerequisites to understand modern web browsers' architecture and significant components. You will discover and fuzz the main browser components such as DOM, JS engines, JIT compilers, WebAssembly, and IPC. You will learn how to use famous tools (Honggfuzz, Domato, Dharma, Fuzzilli, Afl++) and create your custom fuzzers to apply different fuzzing techniques (coverage-guided, grammar-based, in-process fuzzing) to find vulnerabilities/bugs.

๐Ÿ”“ Unlock the power of #FuzzTesting in "Practical Web Browser Fuzzing", a #cybersecurity #training by Patrick Ventuzelo! Understand web browser architecture, setup testing environments, and apply #fuzzing to find critical #vulnerabilities. Get your ticket now!

๐ŸŽŸ๏ธ https://ringzer0.training/trainings/browser-fuzzing.html

Ringzer0 - Practical Web Browser Fuzzing

This course will give you all the prerequisites to understand modern web browsers' architecture and significant components. You will discover and fuzz the main browser components such as DOM, JS engines, JIT compilers, WebAssembly, and IPC. You will learn how to use famous tools (Honggfuzz, Domato, Dharma, Fuzzilli, Afl++) and create your custom fuzzers to apply different fuzzing techniques (coverage-guided, grammar-based, in-process fuzzing) to find vulnerabilities/bugs.