1. Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no program analysis.
2. A Markov chain model is used to explain the challenges and opportunities of CGF, which specifies the probability that fuzzing the seed that exercises path i generates an input that exercises path j.
3. An exponential schedule was implemented by extending AFL, which exposed 3 previously unreported CVEs not exposed by AFL and produced at least an order of magnitude more unique crashes than AFL.
The article “Coverage-based Greybox Fuzzing as Markov Chain” provides a comprehensive overview of Coverage-based Greybox Fuzzing (CGF), a random testing approach that requires no program analysis, and its application in software security testing. The article presents a Markov chain model to explain the challenges and opportunities of CGF, as well as strategies for exploring significantly more paths with the same number of tests by gravitating towards low-frequency paths. The authors also present their implementation of an exponential schedule by extending AFL, which they claim exposes 3 previously unreported CVEs not exposed by AFL and produces at least an order of magnitude more unique crashes than AFL.
The article appears to be reliable and trustworthy overall, as it provides detailed explanations for each concept discussed and cites relevant research papers to support its claims. However, there are some potential biases in the article due to its focus on CGF as a solution for software security testing; other approaches such as taint-based directed whitebox fuzzing or program-adaptive mutational fuzzing are not discussed in detail or compared against CGF in terms of effectiveness or efficiency. Additionally, while the authors provide evidence for their claims regarding their implementation of an exponential schedule by extending AFL, they do not provide any evidence for their claims regarding other approaches such as taint-based directed whitebox fuzzing or program-adaptive mutational fuzzing. Furthermore, while the authors discuss potential risks associated with CGF such as false positives or false negatives, they do not discuss any potential risks associated with other approaches such as taint-based directed whitebox fuzzing or program-adaptive mutational fuzzing.