Following Dragons: Code Review-Guided Fuzzing

📅 2026-02-11
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Traditional fuzzing struggles to effectively cover security-critical deep program states and is often hindered by low-value execution paths, resulting in inefficient vulnerability discovery. This work proposes EyeQ, a novel automated guidance framework that systematically integrates developer security insights from code reviews into the fuzzing process for the first time. By leveraging large language models and program analysis techniques, EyeQ extracts security signals from review discussions, identifies critical code regions, and generates annotations to guide fuzzing. The approach requires no modifications to program semantics or development workflows yet significantly enhances coverage of high-risk paths. Experimental evaluation on PHP’s security-critical codebase uncovered over 40 previously unknown vulnerabilities, demonstrating substantially superior performance compared to standard fuzzing configurations.

Technology Category

Application Category

📝 Abstract
Modern fuzzers scale to large, real-world software but often fail to exercise the program states developers consider most fragile or security-critical. Such states are typically deep in the execution space, gated by preconditions, or overshadowed by lower-value paths that consume limited fuzzing budgets. Meanwhile, developers routinely surface risk-relevant insights during code review, yet this information is largely ignored by automated testing tools. We present EyeQ, a system that leverages developer intelligence from code reviews to guide fuzzing. EyeQ extracts security-relevant signals from review discussions, localizes the implicated program regions, and translates these insights into annotation-based guidance for fuzzing. The approach operates atop existing annotation-aware fuzzing, requiring no changes to program semantics or developer workflows. We first validate EyeQ through a human-guided feasibility study on a security-focused dataset of PHP code reviews, establishing a strong baseline for review-guided fuzzing. We then automate the workflow using a large language model with carefully designed prompts. EyeQ significantly improves vulnerability discovery over standard fuzzing configurations, uncovering more than 40 previously unknown bugs in the security-critical PHP codebase.
Problem

Research questions and friction points this paper is trying to address.

fuzzing
code review
vulnerability discovery
security-critical states
automated testing
Innovation

Methods, ideas, or system contributions that make the work stand out.

code review-guided fuzzing
developer intelligence
annotation-based guidance
large language model
vulnerability discovery
🔎 Similar Papers
No similar papers found.