T-Fuzz: Fuzzing by Program Transformation
暂无分享,去创建一个
[1] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[2] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[3] David Brumley,et al. Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[4] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[5] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[6] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[7] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[8] Alexander Aiken,et al. Synthesizing program input grammars , 2016, PLDI.
[9] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2017, IEEE Trans. Software Eng..
[10] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[11] Herbert Bos,et al. Dowser: A Guided Fuzzer for Finding Buffer Overflow Vulnerabilities , 2013, login Usenix Mag..
[12] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[13] William K. Robertson,et al. LAVA: Large-Scale Automated Vulnerability Addition , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[14] Richard McNally,et al. Fuzzing: The State of the Art , 2012 .
[15] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[16] David Brumley,et al. Scheduling black-box mutational fuzzing , 2013, CCS.
[17] Rishabh Singh,et al. Learn&Fuzz: Machine learning for input fuzzing , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[18] Nahid Shahmehri,et al. Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing , 2015, ESEC/SIGSOFT FSE.
[19] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[20] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[21] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[22] Abhik Roychoudhury,et al. Directed Greybox Fuzzing , 2017, CCS.
[23] Yang Liu,et al. Skyfire: Data-Driven Seed Generation for Fuzzing , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[24] Herbert Bos,et al. The BORG: Nanoprobing Binaries for Buffer Overreads , 2015, CODASPY.
[25] Will Drewry,et al. Flayer: Exposing Application Internals , 2007, WOOT.
[26] David Brumley,et al. Optimizing Seed Selection for Fuzzing , 2014, USENIX Security Symposium.
[27] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).