diff --git a/eth2/utils/ssz/fuzz/Cargo.toml b/eth2/utils/ssz/fuzz/Cargo.toml
index c76cbbbde..055d031a0 100644
--- a/eth2/utils/ssz/fuzz/Cargo.toml
+++ b/eth2/utils/ssz/fuzz/Cargo.toml
@@ -88,6 +88,18 @@ path = "fuzz_targets/fuzz_target_address_encode.rs"
name = "fuzz_target_vec_decode"
path = "fuzz_targets/fuzz_target_vec_decode.rs"
+[[bin]]
+name = "fuzz_target_vec_address_decode"
+path = "fuzz_targets/fuzz_target_vec_address_decode.rs"
+
+[[bin]]
+name = "fuzz_target_vec_u64_decode"
+path = "fuzz_targets/fuzz_target_vec_u64_decode.rs"
+
+[[bin]]
+name = "fuzz_target_vec_bool_decode"
+path = "fuzz_targets/fuzz_target_vec_bool_decode.rs"
+
[[bin]]
name = "fuzz_target_vec_encode"
path = "fuzz_targets/fuzz_target_vec_encode.rs"
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs
new file mode 100644
index 000000000..6c686df1a
--- /dev/null
+++ b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_address_decode.rs
@@ -0,0 +1,12 @@
+#![no_main]
+#[macro_use] extern crate libfuzzer_sys;
+extern crate ethereum_types;
+extern crate ssz;
+
+use ethereum_types::{Address};
+use ssz::{DecodeError, Decodable};
+
+// Fuzz ssz_decode()
+fuzz_target!(|data: &[u8]| {
+ let _result: Result<(Vec
, usize), DecodeError> = Decodable::ssz_decode(data, 0);
+});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs
new file mode 100644
index 000000000..25017ef25
--- /dev/null
+++ b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_bool_decode.rs
@@ -0,0 +1,10 @@
+#![no_main]
+#[macro_use] extern crate libfuzzer_sys;
+extern crate ssz;
+
+use ssz::{DecodeError, Decodable};
+
+// Fuzz ssz_decode()
+fuzz_target!(|data: &[u8]| {
+ let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
+});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs
index 048d19ee5..cc1dc09f5 100644
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs
+++ b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_decode.rs
@@ -9,13 +9,4 @@ use ssz::{DecodeError, Decodable};
// Fuzz ssz_decode()
fuzz_target!(|data: &[u8]| {
let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- /*
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
- */
});
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs
index 6980e5d20..39500b782 100644
--- a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs
+++ b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_encode.rs
@@ -6,7 +6,7 @@ extern crate ssz;
use ethereum_types::{Address, H256};
use ssz::SszStream;
-// Fuzz ssz_decode()
+// Fuzz ssz_encode()
fuzz_target!(|data: &[u8]| {
let mut ssz = SszStream::new();
diff --git a/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs
new file mode 100644
index 000000000..ee25a6378
--- /dev/null
+++ b/eth2/utils/ssz/fuzz/fuzz_targets/fuzz_target_vec_u64_decode.rs
@@ -0,0 +1,10 @@
+#![no_main]
+#[macro_use] extern crate libfuzzer_sys;
+extern crate ssz;
+
+use ssz::{DecodeError, Decodable};
+
+// Fuzz ssz_decode()
+fuzz_target!(|data: &[u8]| {
+ let _result: Result<(Vec, usize), DecodeError> = Decodable::ssz_decode(data, 0);
+});