Thuan Pham
@thuanpv_
Followers
2K
Following
7K
Media
72
Statuses
2K
Senior Lecturer in Cyber Secutity at @UniMelb & ARC DECRA Fellow. Prev @MonashInfotech & @NUSComputing. (Fuzz) Testing enthusiast. Tweets are my own.
Australia
Joined October 2015
Excited to share two new #fuzzing technical reports from my group! 🔹 InsightQL: Advancing Human-Assisted Fuzzing with a Unified Code Database and Parameterized Query Interface 🔹 DynamiQ: Unlocking the Potential of Dynamic Task Allocation in Parallel Fuzzing (tool released!) 1/n
1
5
18
How to scale automatic security testing to arbitrary systems? * Manually writing fuzz drivers doesn't scale. Auto-generating them gives false positives 🤷♂️ * Invivo-fuzzing requires the system configured and the target component executed 👩💻 Can we auto-generate these executions?
Our paper "Scaling Security Testing by Addressing the Reachability Gap" has been accepted at #ICSE26! New paper w/ @mboehme_. https://t.co/tLhkTIY0Eo
https://t.co/rbpxJZLFp6
1
3
30
Really excited to finally announce CodeMender! As part of this we've already submitted and upstreamed several patches to OSS projects via OSS-Fuzz. Check out our post at: https://t.co/qgnroQyIzN There will be more technical details and exciting announcements to come!
deepmind.google
Using advanced AI to fix critical software vulnerabilities
0
11
46
@sangkilc This work is lead by Wenqi Yan in collaboration with Toby and Ben. Our preprint of DynamiQ is now available at https://t.co/3nWEyT1olF, with the tool released at https://t.co/qtL1TvX2ts. Check it out and happy #fuzzing 5/5.
github.com
Contribute to MelbourneFuzzingHub/dynamiq development by creating an account on GitHub.
0
0
5
Our preprint of InsightQL is available at https://t.co/oR6fIxElec. Kudos to Wentao Gao for leading this work in great collaboration with Renata, @sangkilc, and Tian. The framework will be released upon paper acceptance. 3/n
1
0
2
InsightQL supercharges CodeQL with run-time data from fuzzing, enabling reasoning about & fixing fuzz blockers. With a unified code database and parameterized query interface, InsightQL helped remove fuzz blockers in popular OSS projects, boosting code coverage by up to 13.9% 2/n
1
0
1
Looking for a PostDoc, a PhD, and 3-6mth interns as part of my ERC project. Homepage: https://t.co/fPr9gVYYIK Böhme Lab: https://t.co/TLd4TstfJF Reach out if you find this interesting. 👇
0
15
31
Incredible to have helped build the first AI system to reach #1 in the US on @Hacker0x01 ! We found a LOT of great bugs :D
10
10
91
Today as part of our commitment to transparency in this space, we are proud to announce that we have reported the first 20 vulnerabilities discovered using our AI-based "Big Sleep" system powered by Gemini —
17
74
282
As a billards/pool lover (but a bad player), this creative shot really impresses me https://t.co/OmLqMJOaaA. Interestingly, this is like #fuzzing --- we need to reach the buggy location first (ball 1), then satisfy hard-to-solve constraints (ball 2), and finally hit bugs (ball 3)
0
0
1
I wonder how you would feel and respond, as a reviewer, if you saw 3–4 papers submitted to the same venue that target the same problem from slightly different angles, with slightly varied problem statements, but ultimately use almost identical solutions (eg.LLMs as a magic wand)?
0
0
6
The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)
6
31
146
🚨 Our amazing #FUZZING'25 keynotes are online! "Constraining Fuzzing without Paying Too Much" by Miryung Kim https://t.co/HnTgP4LGTX "Are you sure you belong in academia?" by Will Wilson https://t.co/4dOabzNKW2 // @mboehme_, @lszekeres, @moarbugs, @RuijieMeng
We had two exciting keynotes: * From academia: Miryung Kim (Prof @UCLA) and * From industry: Will Wilson (CEO and Co-Founder of @AntithesisHQ). Stay tuned for recordings!
1
8
27
I'm looking for PhD students starting Fall 2026! If you're interested in automated testing and trustworthy program verification, feel free to reach out via email or come chat with me at ISSTA/FSE next week!
Excited to share that two of our papers will be presented next week: one at SIGMOD (Tuesday), and another at the FUZZING Workshop @ ISSTA (Saturday)! The student collaborators from @ECNUER will present the papers. I’ll be at ISSTA/FSE next week—come say hi! Looking forward to
3
11
42
Please consider submitting your works to RAID'25 Posters track, which is due on July 15 AoE. If you have any questions, please contact me or Jason Xue (CSIRO's Data61) as the co-chairs.
🥳Thrilled to say that RAID’25 will run a poster session as the first time in the conference. We look forward to your poster submissions. More info:
0
1
4
The brain behind #Fuzzing every(5G) layer, everywhere (including #DEFCON32) and over-the-air will appear in IEEE TDSC. Feel free to use the open source tool, it is quite popular. Tool: https://t.co/bgPYbSNvD5 Brain: https://t.co/OR75q2CMP3
#5G #Fuzzing #Wireless #CyberSecurity
2
29
122
We're excited to announce two keynote speakers for the #FUZZING'25 workshop (part of @issta_conf at Trondheim, Norway): [*] Will Wilson, CEO and Co-Founder of @AntithesisHQ [*] Miryung Kim, Professor and Vice Chair of Graduate Studies at @UCLAComSci
https://t.co/8To2yddxXa
2
9
34
Awesome job by my PhD student @gabe_sherman6 presenting his work on Oracle-guided C Fuzzing Harness Generation! @ICSEconf TLDR; 41 new bugs (40 now patched)... with 0 false positives! Paper: https://t.co/dqCb3y9Cjy Slides: https://t.co/ovZTXYIcyv Code: https://t.co/IUASTjVkRo
4
14
73
Delighted to receive an ACM SIGSOFT Distinguished Award for this work! Proud of @shrey_twr and the REU students visiting the PASTA lab :-)
🚨 New Paper 🚨 It’s about time someone unraveled the mystery of date/time bugs affecting modern software systems and how to catch them! 📢 I'm excited to share our upcoming MSR'25 paper on exactly this. 📜 Paper: https://t.co/hYEfcDXob9 Thread...
7
7
68