thuanpv_ Profile Banner
Thuan Pham Profile
Thuan Pham

@thuanpv_

Followers
2K
Following
7K
Media
72
Statuses
2K

Senior Lecturer in Cyber Secutity at @UniMelb & ARC DECRA Fellow. Prev @MonashInfotech & @NUSComputing. (Fuzz) Testing enthusiast. Tweets are my own.

Australia
Joined October 2015
Don't wanna be here? Send us removal request.
@thuanpv_
Thuan Pham
2 months
Excited to share two new #fuzzing technical reports from my group! 🔹 InsightQL: Advancing Human-Assisted Fuzzing with a Unified Code Database and Parameterized Query Interface 🔹 DynamiQ: Unlocking the Potential of Dynamic Task Allocation in Parallel Fuzzing (tool released!) 1/n
1
5
18
@mboehme_
Marcel Böhme👨‍🔬
29 days
How to scale automatic security testing to arbitrary systems? * Manually writing fuzz drivers doesn't scale. Auto-generating them gives false positives 🤷‍♂️ * Invivo-fuzzing requires the system configured and the target component executed 👩‍💻 Can we auto-generate these executions?
@Gaetano__Sapia
gps
29 days
Our paper "Scaling Security Testing by Addressing the Reachability Gap" has been accepted at #ICSE26! New paper w/ @mboehme_. https://t.co/tLhkTIY0Eo https://t.co/rbpxJZLFp6
1
3
30
@halbecaf
Oliver Chang
2 months
Really excited to finally announce CodeMender! As part of this we've already submitted and upstreamed several patches to OSS projects via OSS-Fuzz. Check out our post at: https://t.co/qgnroQyIzN There will be more technical details and exciting announcements to come!
Tweet card summary image
deepmind.google
Using advanced AI to fix critical software vulnerabilities
0
11
46
@thuanpv_
Thuan Pham
2 months
@sangkilc This work is lead by Wenqi Yan in collaboration with Toby and Ben. Our preprint of DynamiQ is now available at https://t.co/3nWEyT1olF, with the tool released at https://t.co/qtL1TvX2ts. Check it out and happy #fuzzing 5/5.
Tweet card summary image
github.com
Contribute to MelbourneFuzzingHub/dynamiq development by creating an account on GitHub.
0
0
5
@thuanpv_
Thuan Pham
2 months
@sangkilc DynamiQ is a full-fledged successor to AFLTeam, enabling dynamic and adaptive parallel fuzzing. Built on LibAFL with practical optimizations, it uncovered 9 previously unknown bugs in popular projects, including the well-tested SQLite. 4/n
1
0
1
@thuanpv_
Thuan Pham
2 months
Our preprint of InsightQL is available at https://t.co/oR6fIxElec. Kudos to Wentao Gao for leading this work in great collaboration with Renata, @sangkilc, and Tian. The framework will be released upon paper acceptance. 3/n
1
0
2
@thuanpv_
Thuan Pham
2 months
InsightQL supercharges CodeQL with run-time data from fuzzing, enabling reasoning about & fixing fuzz blockers. With a unified code database and parameterized query interface, InsightQL helped remove fuzz blockers in popular OSS projects, boosting code coverage by up to 13.9% 2/n
1
0
1
@mboehme_
Marcel Böhme👨‍🔬
2 months
Looking for a PostDoc, a PhD, and 3-6mth interns as part of my ERC project. Homepage: https://t.co/fPr9gVYYIK Böhme Lab: https://t.co/TLd4TstfJF Reach out if you find this interesting. 👇
0
15
31
@moyix
Brendan Dolan-Gavitt
5 months
Incredible to have helped build the first AI system to reach #1 in the US on @Hacker0x01 ! We found a LOT of great bugs :D
@Xbow
XBOW
5 months
For the first time in history, the #1 hacker in the US is an AI. (1/8)
10
10
91
@argvee
Heather Adkins - Ꜻ - Spes consilium non est
4 months
Today as part of our commitment to transparency in this space, we are proud to announce that we have reported the first 20 vulnerabilities discovered using our AI-based "Big Sleep" system powered by Gemini —
17
74
282
@thuanpv_
Thuan Pham
4 months
As a billards/pool lover (but a bad player), this creative shot really impresses me https://t.co/OmLqMJOaaA. Interestingly, this is like #fuzzing --- we need to reach the buggy location first (ball 1), then satisfy hard-to-solve constraints (ball 2), and finally hit bugs (ball 3)
0
0
1
@thuanpv_
Thuan Pham
5 months
I wonder how you would feel and respond, as a reviewer, if you saw 3–4 papers submitted to the same venue that target the same problem from slightly different angles, with slightly varied problem statements, but ultimately use almost identical solutions (eg.LLMs as a magic wand)?
0
0
6
@moyix
Brendan Dolan-Gavitt
5 months
The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)
6
31
146
@yannicnoller
Yannic Noller (@yannicnoller.bsky.social)
5 months
🚨 Our amazing #FUZZING'25 keynotes are online! "Constraining Fuzzing without Paying Too Much" by Miryung Kim https://t.co/HnTgP4LGTX "Are you sure you belong in academia?" by Will Wilson https://t.co/4dOabzNKW2 // @mboehme_, @lszekeres, @moarbugs, @RuijieMeng
@mboehme_
Marcel Böhme👨‍🔬
5 months
We had two exciting keynotes: * From academia: Miryung Kim (Prof @UCLA) and * From industry: Will Wilson (CEO and Co-Founder of @AntithesisHQ). Stay tuned for recordings!
1
8
27
@chengyuzh
Chengyu Zhang
5 months
I'm looking for PhD students starting Fall 2026! If you're interested in automated testing and trustworthy program verification, feel free to reach out via email or come chat with me at ISSTA/FSE next week!
@chengyuzh
Chengyu Zhang
5 months
Excited to share that two of our papers will be presented next week: one at SIGMOD (Tuesday), and another at the FUZZING Workshop @ ISSTA (Saturday)! The student collaborators from @ECNUER will present the papers. I’ll be at ISSTA/FSE next week—come say hi! Looking forward to
3
11
42
@thuanpv_
Thuan Pham
6 months
Please consider submitting your works to RAID'25 Posters track, which is due on July 15 AoE. If you have any questions, please contact me or Jason Xue (CSIRO's Data61) as the co-chairs.
@RAID_Conference
RAID Conference
6 months
🥳Thrilled to say that RAID’25 will run a poster session as the first time in the conference. We look forward to your poster submissions. More info:
0
1
4
@chatsudi
Sudipta
6 months
The brain behind #Fuzzing every(5G) layer, everywhere (including #DEFCON32) and over-the-air will appear in IEEE TDSC. Feel free to use the open source tool, it is quite popular. Tool: https://t.co/bgPYbSNvD5 Brain: https://t.co/OR75q2CMP3 #5G #Fuzzing #Wireless #CyberSecurity
2
29
122
@moarbugs
Rohan Padhye
6 months
We're excited to announce two keynote speakers for the #FUZZING'25 workshop (part of @issta_conf at Trondheim, Norway): [*] Will Wilson, CEO and Co-Founder of @AntithesisHQ [*] Miryung Kim, Professor and Vice Chair of Graduate Studies at @UCLAComSci https://t.co/8To2yddxXa
2
9
34
@snagycs
Stefan Nagy
7 months
Awesome job by my PhD student @gabe_sherman6 presenting his work on Oracle-guided C Fuzzing Harness Generation! @ICSEconf TLDR; 41 new bugs (40 now patched)... with 0 false positives! Paper: https://t.co/dqCb3y9Cjy Slides: https://t.co/ovZTXYIcyv Code: https://t.co/IUASTjVkRo
4
14
73
@moarbugs
Rohan Padhye
7 months
Delighted to receive an ACM SIGSOFT Distinguished Award for this work! Proud of @shrey_twr and the REU students visiting the PASTA lab :-)
@shrey_twr
Shrey Tiwari
9 months
🚨 New Paper 🚨 It’s about time someone unraveled the mystery of date/time bugs affecting modern software systems and how to catch them! 📢 I'm excited to share our upcoming MSR'25 paper on exactly this. 📜 Paper: https://t.co/hYEfcDXob9 Thread...
7
7
68