Firmware code instrumentation technology for internet of things-based services
暂无分享,去创建一个
Tao Qi | Zhaolei Zhang | Peng Sun | Chen Chen | Baojiang Cui | Weikong Qi | Jinxin Ma
[1] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[2] DART: directed automated random testing , 2005, PLDI.
[3] Aurélien Francillon,et al. What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices , 2018, NDSS.
[4] Junfeng Yang,et al. NEUZZ: Efficient Fuzzing with Neural Program Smoothing , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[5] Nahid Shahmehri,et al. Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing , 2015, ESEC/SIGSOFT FSE.
[6] Zhiqiang Lin,et al. IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing , 2018, NDSS.
[7] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI.
[8] Tzi-cker Chiueh,et al. BIRD: binary interpretation using runtime disassembly , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[9] David Brumley,et al. Optimizing Seed Selection for Fuzzing , 2014, USENIX Security Symposium.
[10] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[11] Amy Nordrum,et al. The internet of fewer things [News] , 2016 .
[12] Andreas Zeller,et al. Mining input grammars from dynamic taints , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[14] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[15] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[16] WongWeng-Fai,et al. Dynamic cache contention detection in multi-threaded applications , 2011 .
[17] Amitabh Srivastava,et al. Vulcan Binary transformation in a distributed environment , 2001 .
[18] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[19] Michael Laurenzano,et al. PEBIL: Efficient static binary instrumentation for Linux , 2010, 2010 IEEE International Symposium on Performance Analysis of Systems & Software (ISPASS).
[20] H. Shrobe,et al. FirmFuzz: Automated IoT Firmware Introspection and Analysis , 2019, IoT S&P@CCS.
[21] ATOM - A System for Building Customized Program Analysis Tools , 1994, PLDI.
[22] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[23] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[24] Matthew Hicks,et al. Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing , 2018, 2019 IEEE Symposium on Security and Privacy (SP).
[25] Brian S. Pak,et al. Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution , 2012 .
[26] Stephen McCamant,et al. Statically-directed dynamic automated test generation , 2011, ISSTA '11.
[27] Yang Xu,et al. A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.
[28] Weng-Fai Wong,et al. Dynamic cache contention detection in multi-threaded applications , 2011, VEE '11.
[29] Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI.