JOURNAL ARTICLE

CBGF: Callback Coverage Guided Fuzzing

Ho Young HwangDaesung Moon

Year: 2025 Journal:   IEEE Access Vol: 13 Pages: 68831-68840   Publisher: Institute of Electrical and Electronics Engineers

Abstract

Callback functions are widely used across programming languages, libraries, and operating systems. While offering flexible software design, these mechanisms introduce inherently complex execution flows that can serve as potential attack vectors for security vulnerabilities. Despite the continuous reporting and active exploitation of callback-related vulnerabilities in real-world environments, traditional coverage-guided greybox fuzzing approaches typically instrument the entire codebase uniformly without prioritizing callback functions, thereby insufficiently capturing callback-specific execution flows and limiting the effectiveness in detecting these vulnerabilities. We propose Callback Coverage Guided Fuzzing (CBGF), a novel approach that leverages user-defined callback functions to strategically insert instrumentation code, enabling precise monitoring of callback execution flows. The proposed instrumentation approach facilitates the comprehensive identification of callback execution paths while maintaining seamless compatibility with existing fuzzing frameworks. Our evaluation using CPython demonstrated the effectiveness of CBGF, by discovering seven bugs, including five callback-related vulnerabilities.

Keywords:
Fuzz testing Callback Computer science Programming language Software

Metrics

0
Cited By
0.00
FWCI (Field Weighted Citation Impact)
21
Refs
0.04
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Topics

Artificial Intelligence in Games
Physical Sciences →  Computer Science →  Artificial Intelligence
© 2026 ScienceGate Book Chapters — All rights reserved.