QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing
暂无分享,去创建一个
Meng Xu | Taesoo Kim | Sangho Lee | Yeongjin Jang | Insu Yun | Taesoo Kim | Sangho Lee | Yeongjin Jang | Insu Yun | Meng Xu
[1] Angelos D. Keromytis,et al. A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware , 2012, NDSS.
[2] Rishabh Singh,et al. Not all bytes are equal: Neural byte sieve for fuzzing , 2017, ArXiv.
[3] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[4] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[5] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2017, IEEE Trans. Software Eng..
[6] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[7] Marcelo d'Amorim,et al. A Comparative Study of Incremental Constraint Solving Approaches in Symbolic Execution , 2014, Haifa Verification Conference.
[8] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[9] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[10] Alexander Aiken,et al. Stratified synthesis: automatically learning the x86-64 instruction set , 2016, PLDI.
[11] Rick Chen,et al. End-to-End Verification of Processors with ISA-Formal , 2016, CAV.
[12] Koushik Sen,et al. FairFuzz: A Targeted Mutation Strategy for Increasing Greybox Fuzz Testing Coverage , 2017, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[13] Brian S. Pak,et al. Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution , 2012 .
[14] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[15] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[16] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[17] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[18] William K. Robertson,et al. LAVA: Large-Scale Automated Vulnerability Addition , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[19] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[20] Mathias Payer,et al. T-Fuzz: Fuzzing by Program Transformation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[21] Jean-Yves Marion,et al. Specification of concretization and symbolization policies in symbolic execution , 2016, ISSTA.
[22] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[23] Joe Hendrix,et al. Bounded Integer Linear Constraint Solving via Lattice Search , 2015 .
[24] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[26] Patrice Godefroid,et al. Billions and billions of constraints: Whitebox fuzz testing in production , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[27] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[28] David Brumley,et al. Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[29] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[30] Hao Chen,et al. Angora: Efficient Fuzzing by Principled Search , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[31] Rupak Majumdar,et al. Hybrid Concolic Testing , 2007, 29th International Conference on Software Engineering (ICSE'07).
[32] Stephen McCamant,et al. Path-exploration lifting: hi-fi tests for lo-fi emulators , 2012, ASPLOS XVII.