Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations
暂无分享,去创建一个
Herbert Bos | Asia Slowinska | István Haller | Matthias Neugschwandtner | H. Bos | M. Neugschwandtner | I. Haller | Asia Slowinska
[1] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[2] Herbert Bos,et al. Memory Errors: The Past, the Present, and the Future , 2012, RAID.
[3] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[4] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[5] Sarfraz Khurshid,et al. Generalized Symbolic Execution for Model Checking and Testing , 2003, TACAS.
[6] Cristian Cadar,et al. make test-zesti: A symbolic execution solution for improving regression testing , 2012, 2012 34th International Conference on Software Engineering (ICSE).
[7] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[8] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[9] Kevin C. Almeroth,et al. SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr , 2006, ISC.
[10] Xiangyu Zhang,et al. Strict control dependence and its effect on dynamic information flow analyses , 2010, ISSTA '10.
[11] Joe D. Warren,et al. The program dependence graph and its use in optimization , 1984, TOPL.
[12] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[13] Laurie A. Williams,et al. Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista , 2010, 2010 Third International Conference on Software Testing, Verification and Validation.
[14] David A. Wagner,et al. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs , 2009, USENIX Security Symposium.
[15] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[16] Viet Hung Nguyen,et al. Predicting vulnerable software components with dependency graphs , 2010, MetriSec '10.
[17] Martin C. Rinard,et al. Taint-based directed whitebox fuzzing , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[18] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[19] Bruno Marre,et al. On-the-fly generation of k-path tests for C functions , 2004, Proceedings. 19th International Conference on Automated Software Engineering, 2004..
[20] Vtt Publications,et al. A Functional Method for Assessing Protocol Implementation Security , 2001 .
[21] Miguel Castro,et al. Preventing Memory Error Exploits with WIT , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[22] Alexander Sotirov,et al. Modern Exploitation and Memory Protection Bypasses , 2009 .
[23] Andreas Zeller,et al. Mining metrics to predict component failures , 2006, ICSE.
[24] Laurie A. Williams,et al. An initial study on the use of execution complexity metrics as indicators of software vulnerabilities , 2011, SESS '11.
[25] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[26] Herbert Bos,et al. Body Armor for Binaries: Preventing Buffer Overflows Without Recompilation , 2012, USENIX Annual Technical Conference.
[27] Patrice Godefroid,et al. Automatic partial loop summarization in dynamic test generation , 2011, ISSTA '11.
[28] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[29] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[30] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[31] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[32] Richard Lippmann,et al. Testing static analysis tools using exploitable buffer overflows from open source code , 2004, SIGSOFT '04/FSE-12.
[33] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[34] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[35] Koushik Sen,et al. CUTE: a concolic unit testing engine for C , 2005, ESEC/FSE-13.
[36] Amir D. Aczel. Complete Business Statistics , 1992 .
[37] Stephen McCamant,et al. Statically-directed dynamic automated test generation , 2011, ISSTA '11.
[38] Herbert Bos,et al. Pointless tainting?: evaluating the practicality of pointer tainting , 2009, EuroSys '09.
[39] Michael Gegick,et al. Prioritizing software security fortification throughcode-level metrics , 2008, QoP '08.