WEIZZ: automatic grey-box fuzzing for structured binary formats
暂无分享,去创建一个
[1] Hao Chen,et al. Angora: Efficient Fuzzing by Principled Search , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[2] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[3] Dave Aitel,et al. The Advantages of Block - Based Protocol Analysis for Security Testing , 2002 .
[4] Choongwoo Han,et al. Grey-Box Concolic Testing on Binary Code , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[5] Thorsten Holz,et al. GRIMOIRE: Synthesizing Structure while Fuzzing , 2019, USENIX Security Symposium.
[6] Saumya Debray,et al. A Generic Approach to Automatic Deobfuscation of Executable Code , 2015, 2015 IEEE Symposium on Security and Privacy.
[7] Andrew E. Santosa,et al. Smart Greybox Fuzzing , 2018, IEEE Transactions on Software Engineering.
[8] Andreas Zeller,et al. Mining Input Grammars with AUTOGRAM , 2017, 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C).
[9] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[11] Ahmad-Reza Sadeghi,et al. NAUTILUS: Fishing for Deep Bugs with Grammars , 2019, NDSS.
[12] Andreas Zeller,et al. Mining input grammars from dynamic taints , 2016, 2016 31st IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] Saumya Debray,et al. Bit-Level Taint Analysis , 2014, 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation.
[14] Meng Xu,et al. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing , 2018, USENIX Security Symposium.
[15] Xiangyu Zhang,et al. SLF: Fuzzing without Valid Seed Inputs , 2019, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[16] Helen J. Wang,et al. Tupni: automatic reverse engineering of input formats , 2008, CCS.
[17] Jared D. DeMott,et al. Fuzzing for Software Security Testing and Quality Assurance , 2008 .
[18] Thorsten Holz,et al. REDQUEEN: Fuzzing with Input-to-State Correspondence , 2019, NDSS.
[19] Roberto Baldoni,et al. A Survey of Symbolic Execution Techniques , 2016, ACM Comput. Surv..
[20] Camil Demetrescu,et al. Mining hot calling contexts in small space , 2011, PLDI '11.
[21] Yang Liu,et al. Superion: Grammar-Aware Greybox Fuzzing , 2018, 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE).
[22] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[23] Mathias Payer,et al. T-Fuzz: Fuzzing by Program Transformation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[24] Lorenzo Cavallaro,et al. SoK: Using Dynamic Binary Instrumentation for Security (And How You May Get Caught Red Handed) , 2019, AsiaCCS.
[25] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[26] Camil Demetrescu,et al. Mining hot calling contexts in small space , 2016, Softw. Pract. Exp..
[27] Andreas Zeller,et al. Fuzzing with Code Fragments , 2012, USENIX Security Symposium.