NEUZZ: Efficient Fuzzing with Neural Program Smoothing
暂无分享,去创建一个
Junfeng Yang | Suman Jana | Baishakhi Ray | Kexin Pei | Dongdong She | Dave Epstein | S. Jana | Kexin Pei | Junfeng Yang | Baishakhi Ray | Dave Epstein | Dongdong She
[1] Swarat Chaudhuri,et al. Smooth interpretation , 2010, PLDI '10.
[2] Kang Tai,et al. Comparison of statistical and machine learning methods in modelling of data with multicollinearity , 2013, Int. J. Model. Identif. Control..
[3] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[4] David Brumley,et al. Scheduling black-box mutational fuzzing , 2013, CCS.
[5] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[6] Honglak Lee,et al. Convolutional deep belief networks for scalable unsupervised learning of hierarchical representations , 2009, ICML '09.
[7] J. Nocedal,et al. A Limited Memory Algorithm for Bound Constrained Optimization , 1995, SIAM J. Sci. Comput..
[8] Sanjay Rawat,et al. KameleonFuzz: evolutionary fuzzing for black-box XSS detection , 2014, CODASPY '14.
[9] Anthony V. Robins,et al. Catastrophic Forgetting, Rehearsal and Pseudorehearsal , 1995, Connect. Sci..
[10] Stephen J. Wright,et al. Numerical Optimization , 2018, Fundamental Statistical Inference.
[11] Itamar Arel,et al. Unsupervised neuron selection for mitigating catastrophic forgetting in neural networks , 2014, 2014 IEEE 57th International Midwest Symposium on Circuits and Systems (MWSCAS).
[12] W. Abraham,et al. Memory retention – the synaptic stability versus plasticity dilemma , 2005, Trends in Neurosciences.
[13] Geoffrey E. Hinton. Using fast weights to deblur old memories , 1987 .
[14] David Lorge Parnas. Software aspects of strategic defense systems , 1985, SOEN.
[15] M. J. D. Powell,et al. UOBYQA: unconstrained optimization by quadratic approximation , 2002, Math. Program..
[16] D K Smith,et al. Numerical Optimization , 2001, J. Oper. Res. Soc..
[17] Razvan Pascanu,et al. Overcoming catastrophic forgetting in neural networks , 2016, Proceedings of the National Academy of Sciences.
[18] Swarat Chaudhuri,et al. Smoothing a Program Soundly and Robustly , 2011, CAV.
[19] Ken-ichi Funahashi,et al. On the approximate realization of continuous mappings by neural networks , 1989, Neural Networks.
[20] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[21] Hongzhi Wang,et al. Life-long learning based on dynamic combination model , 2017, Appl. Soft Comput..
[22] William K. Robertson,et al. LAVA: Large-Scale Automated Vulnerability Addition , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[23] Michael McCloskey,et al. Catastrophic Interference in Connectionist Networks: The Sequential Learning Problem , 1989 .
[24] Sarfraz Khurshid,et al. Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[25] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[26] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[27] Geoffrey E. Hinton,et al. ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.
[28] Chrisantha Fernando,et al. PathNet: Evolution Channels Gradient Descent in Super Neural Networks , 2017, ArXiv.
[29] Andrea Vedaldi,et al. Understanding deep image representations by inverting them , 2014, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR).
[30] Quoc V. Le,et al. Neural Programmer: Inducing Latent Programs with Gradient Descent , 2015, ICLR.
[31] Martín Abadi,et al. Learning a Natural Language Interface with Neural Programmer , 2016, ICLR.
[32] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[33] Angelos D. Keromytis,et al. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities , 2017, CCS.
[34] Mark Raugas,et al. Faster Fuzzing: Reinitialization with Deep Neural Models , 2017, ArXiv.
[35] Rishabh Singh,et al. Learn&Fuzz: Machine learning for input fuzzing , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[36] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[37] Hod Lipson,et al. Understanding Neural Networks Through Deep Visualization , 2015, ArXiv.
[38] Tamara G. Kolda,et al. Optimization by Direct Search: New Perspectives on Some Classical and Modern Methods , 2003, SIAM Rev..
[39] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[40] Mark Harman,et al. A Theoretical and Empirical Study of Search-Based Testing: Local, Global, and Hybrid Search , 2010, IEEE Transactions on Software Engineering.
[41] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[42] Katya Scheinberg,et al. On the convergence of derivative-free methods for unconstrained optimization , 1997 .
[43] Yoshua Bengio,et al. Gradient-based learning applied to document recognition , 1998, Proc. IEEE.
[44] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[45] Sumit Gulwani,et al. Continuity analysis of programs , 2010, POPL '10.
[46] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2017, IEEE Trans. Software Eng..
[47] Conrad D. James,et al. Neurogenesis deep learning: Extending deep networks to accommodate new classes , 2016, 2017 International Joint Conference on Neural Networks (IJCNN).
[48] Jonathon Shlens,et al. Explaining and Harnessing Adversarial Examples , 2014, ICLR.
[49] T. Pulliam,et al. A comparative evaluation of genetic and gradient-based algorithms applied to aerodynamic optimization , 2008 .
[50] Kurt Hornik,et al. Approximation capabilities of multilayer feedforward networks , 1991, Neural Networks.
[51] P. Pardalos,et al. Handbook of global optimization , 1995 .
[52] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[53] Rishabh Singh,et al. Not all bytes are equal: Neural byte sieve for fuzzing , 2017, ArXiv.
[54] Angelos D. Keromytis,et al. HVLearn: Automated Black-Box Analysis of Hostname Verification in SSL/TLS Implementations , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[55] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[56] Alexander Aiken,et al. Synthesizing program input grammars , 2016, PLDI.
[57] Dimitri P. Bertsekas,et al. Convex Optimization Algorithms , 2015 .
[58] Mathias Payer,et al. T-Fuzz: Fuzzing by Program Transformation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[59] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[60] Sumit Gulwani,et al. Continuity and robustness of programs , 2012, CACM.
[61] Andrew Zisserman,et al. Deep Inside Convolutional Networks: Visualising Image Classification Models and Saliency Maps , 2013, ICLR.
[62] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[63] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[64] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[65] Sarfraz Khurshid,et al. Generalized Symbolic Execution for Model Checking and Testing , 2003, TACAS.
[66] Ronald Kemker,et al. Measuring Catastrophic Forgetting in Neural Networks , 2017, AAAI.
[67] Alex Graves,et al. Neural Turing Machines , 2014, ArXiv.
[68] François Chollet,et al. Keras: The Python Deep Learning library , 2018 .
[69] Rishabh Singh,et al. Deep Reinforcement Fuzzing , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[70] Yang Liu,et al. Skyfire: Data-Driven Seed Generation for Fuzzing , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[71] Herbert Bos,et al. The BORG: Nanoprobing Binaries for Buffer Overreads , 2015, CODASPY.
[72] J. Nocedal. Updating Quasi-Newton Matrices With Limited Storage , 1980 .
[73] Katya Scheinberg,et al. Recent progress in unconstrained nonlinear optimization without derivatives , 1997, Math. Program..
[74] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[75] Hao Chen,et al. Angora: Efficient Fuzzing by Principled Search , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[76] Shweta Shinde,et al. Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution , 2018, ArXiv.
[77] Nando de Freitas,et al. Neural Programmer-Interpreters , 2015, ICLR.