Detection of Intrusions and Malware, and Vulnerability Assessment
暂无分享,去创建一个
[1] Nikolai Tillmann,et al. Fitness-guided path exploration in dynamic symbolic execution , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[2] Rupak Majumdar,et al. Hybrid Concolic Testing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[3] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[4] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[5] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[6] Matthew B. Dwyer,et al. Probabilistic symbolic execution , 2012, ISSTA 2012.
[7] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[8] Jared D. DeMott,et al. Fuzzing for Software Security Testing and Quality Assurance , 2008 .
[9] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[10] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[11] Cacm Staff,et al. BufferBloat , 2011, Communications of the ACM.
[12] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[13] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.