Trigger condition based test generation for finding security bugs
暂无分享,去创建一个
[1] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[2] Marsha Chechik,et al. A buffer overflow benchmark for software model checkers , 2007, ASE.
[3] Nikolai Tillmann,et al. Automating Software Testing Using Program Analysis , 2008, IEEE Software.
[4] 田端 利宏,et al. Network and Distributed System Security Symposiumにおける研究動向の調査 , 2004 .
[5] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[6] David L. Dill,et al. A Decision Procedure for Bit-Vectors and Arrays , 2007, CAV.
[7] Raúl A. Santelices,et al. Exploiting program dependencies for scalable multiple-path symbolic execution , 2010, ISSTA '10.
[8] Corina S. Pasareanu,et al. Symbolic execution with mixed concrete-symbolic solving , 2011, ISSTA '11.
[9] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Tao Wei,et al. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution , 2009, NDSS.
[11] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.