Full-Speed Fuzzing: Reducing Fuzzing Overhead through Coverage-Guided Tracing
暂无分享,去创建一个
[1] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[2] Abhik Roychoudhury,et al. Directed Greybox Fuzzing , 2017, CCS.
[3] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[4] Sebastian Schinzel,et al. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels , 2017, USENIX Security Symposium.
[5] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2016, IEEE Transactions on Software Engineering.
[6] John L. Gustafson,et al. Reevaluating Amdahl's law , 1988, CACM.
[7] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[8] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[9] Alves-FossJim,et al. The DARPA Cyber Grand Challenge , 2015, IEEE S&P 2015.
[10] Leonardo Babun,et al. A Survey on Function and System Call Hooking Approaches , 2017, Journal of Hardware and Systems Security.
[11] Adam Kiezun,et al. Grammar-based whitebox fuzzing , 2008, PLDI '08.
[12] Martin C. Rinard,et al. Taint-based directed whitebox fuzzing , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[13] Dawn Xiaodong Song,et al. PerfFuzz: automatically generating pathological inputs , 2018, ISSTA.
[14] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[15] Nahid Shahmehri,et al. Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing , 2015, ESEC/SIGSOFT FSE.
[16] Barton P. Miller,et al. Anywhere, any-time binary instrumentation , 2011, PASTE '11.
[17] Harish Patil,et al. Pin: building customized program analysis tools with dynamic instrumentation , 2005, PLDI '05.
[18] Meng Xu,et al. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing , 2018, USENIX Security Symposium.
[19] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[20] Greg Wilson,et al. The architecture of open source applications : elegance, evolution, and a few fearless hacks , 2011 .
[21] Andrew Ruef,et al. Evaluating Fuzz Testing , 2018, CCS.
[22] Martin Vuagnoux,et al. Autodafé: an Act of Software Torture , 2005 .
[23] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[24] Kosta Serebryany,et al. Continuous Fuzzing with libFuzzer and AddressSanitizer , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[25] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[26] Frank T. Willmore,et al. Debugging with gdb , 2016 .
[27] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[28] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[29] Jack W. Davidson,et al. Zipr: Efficient Static Binary Rewriting for Security , 2017, 2017 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
[30] Hao Chen,et al. Angora: Efficient Fuzzing by Principled Search , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[31] Dinghao Wu,et al. Reassembleable Disassembling , 2015, USENIX Security Symposium.
[32] Kostya Serebryany,et al. OSS-Fuzz - Google's continuous fuzzing service for open source software , 2017 .
[33] Daniel Kästner,et al. Generic control flow reconstruction from assembly code , 2002, LCTES/SCOPES '02.
[34] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[35] Wen Xu,et al. Designing New Operating Primitives to Improve Fuzzing Performance , 2017, CCS.
[36] Masami Hiramatsu,et al. Djprobe—Kernel probing with the smallest overhead , 2010 .
[37] William K. Robertson,et al. LAVA: Large-Scale Automated Vulnerability Addition , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[38] Helmut Veith,et al. An Abstract Interpretation-Based Framework for Control Flow Reconstruction from Binaries , 2008, VMCAI.
[39] Yang Liu,et al. Skyfire: Data-Driven Seed Generation for Fuzzing , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[40] Henrik Theiling,et al. Extracting safe and precise control flow from binaries , 2000, Proceedings Seventh International Conference on Real-Time Computing Systems and Applications.
[41] Xu Zhou,et al. PTfuzz: Guided Fuzzing With Processor Trace Feedback , 2018, IEEE Access.
[42] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[43] A. Vargha,et al. A Critique and Improvement of the CL Common Language Effect Size Statistics of McGraw and Wong , 2000 .
[44] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[45] Mathias Payer,et al. T-Fuzz: Fuzzing by Program Transformation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[46] Patrice Godefroid,et al. Billions and billions of constraints: Whitebox fuzz testing in production , 2013, 2013 35th International Conference on Software Engineering (ICSE).
[47] Christopher Krügel,et al. Ramblr: Making Reassembly Great Again , 2017, NDSS.