AI-Fuzzing: From Stochastic Chaos to Directed Precision

EthCC [9] Β· April 2026

Absolute pleasure speaking at EthCC main conference on AI-fuzzing in Cannes πŸ‡«πŸ‡·. Since AI-security is moving rapidly forward, I shared my prototype and methodologies on how I combine AI and fuzzing techniques to further improve our security measures.

Fuzzing should no longer be stochastic β€” we combine AI with fuzzing to transform security into directed precision.

From Stochastic Chaos to Directed Precision β€” watch the talk on YouTube.


What I covered in my talk

1) Why random fuzzing fails on smart contracts?

2) What is the core framework for understanding smart contract exploits?

3) How do we combine LLM and fuzzing?

A) Taint analysis

By building a semantic knowledge graph of the contract(s) and scoring risk per variable or storage slot, we can output a fuzzing schedule targeting the highest-suspicion paths first β€” conducting path prioritization or even constructing suspected action sequences.

B) Integration of external call and long-call chain tracer

Problem: Long call chains with external calls. The $120M Balancer exploit lived deep in the chain batchSwap() β†’ … β†’ onSwap() β†’ … β†’ _swapGivenOut() β†’ … β†’ _upscale().

C) Complex data generation

Bytes and calldata inputs are opaque to random mutation.

D) Dynamic revert feedback (a significant advancement for fuzzers)

Problem: Stochastic execution leads to frequent reverts and ineffective execution.

Solution: When execution reverts, most fuzzers discard the result.

  1. We extract the raw trace, decode the revert, and send it to the LLM.
  2. We obtain actionable input bounds.
  3. We guide the next mutation for our fuzzer.
  4. The fuzzer learns from failures in real time.

4) Visualized result

Our talk features a well-visualized result: chaotic CFG β†’ path reduction β†’ a single directed path (in yellow) hitting the exact vulnerable segment. From stochastic chaos to directed precision.


There are always different innovative ways of combining AI with traditional software testing techniques β€” for example:

I am always happy to discuss AI integrations from any security perspective. Let me know if you have any thoughts β€” and if you want the full narrative, go through the talk: AI-Fuzzing: From Stochastic Chaos to Directed Precision.

← Back to Writings