Fuzzing: a survey
暂无分享,去创建一个
[1] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[2] Sang Kil Cha,et al. IMF: Inferred Model-based Fuzzer , 2017, CCS.
[3] Song Wang,et al. QTEP: quality-aware test case prioritization , 2017, ESEC/SIGSOFT FSE.
[4] Konstantin Serebryany,et al. ThreadSanitizer: data race detection in practice , 2009, WBIA '09.
[5] Robert W. Shirey,et al. Internet Security Glossary , 2000, RFC.
[6] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[7] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[8] Abhik Roychoudhury,et al. Directed Greybox Fuzzing , 2017, CCS.
[9] Sebastian Schinzel,et al. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels , 2017, USENIX Security Symposium.
[10] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[11] Erik Meijer. Your mouse is a database , 2012, CACM.
[12] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[13] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2016, IEEE Transactions on Software Engineering.
[14] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[15] Arnold Rosenbloom,et al. AutoFuzz: Automated Network Protocol Fuzzing Framework , 2010 .
[16] Joeri de Ruiter,et al. Protocol State Fuzzing of TLS Implementations , 2015, USENIX Security Symposium.
[17] Wen Xu,et al. Designing New Operating Primitives to Improve Fuzzing Performance , 2017, CCS.
[18] Zhuhua Cai,et al. Software Vulnerability Discovery Techniques: A Survey , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[19] Kevin C. Almeroth,et al. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr , 2006, ISC.
[20] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[21] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[22] Xiangyu Zhang,et al. Dynamic Program Analysis , 2011, Encyclopedia of Cryptography and Security.
[23] Angelos D. Keromytis,et al. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities , 2017, CCS.
[24] Mark Raugas,et al. Faster Fuzzing: Reinitialization with Deep Neural Models , 2017, ArXiv.
[25] Qian Yang,et al. A survey of coverage based testing tools , 2006, AST '06.
[26] Brian A. Wichmann,et al. Industrial perspective on static analysis , 1995, Softw. Eng. J..
[27] Liu Jing-ju. Survey on Fuzzing , 2010 .
[28] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[29] Yang Liu,et al. Skyfire: Data-Driven Seed Generation for Fuzzing , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[30] Jared D. DeMott,et al. Fuzzing for Software Security Testing and Quality Assurance , 2008 .
[31] Rishabh Singh,et al. Learn&Fuzz: Machine learning for input fuzzing , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[32] Rishabh Singh,et al. Not all bytes are equal: Neural byte sieve for fuzzing , 2017, ArXiv.