V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs
暂无分享,去创建一个
Chunming Wu | Yuan Chen | Raheem Beyah | Shouling Ji | Jianhai Chen | Qinchen Gu | Chenyang Lyu | Yuwei Li | S. Ji | R. Beyah | Yuan Chen | Yuwei Li | Jianhai Chen | Qinchen Gu | Chunming Wu | Chenyang Lyu
[1] Yang Liu,et al. Steelix: program-state based binary fuzzing , 2017, ESEC/SIGSOFT FSE.
[2] Hao Chen,et al. Angora: Efficient Fuzzing by Principled Search , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[3] Laurie A. Williams,et al. Can traditional fault prediction models be used for vulnerability prediction? , 2011, Empirical Software Engineering.
[4] Insik Shin,et al. Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing , 2018, NDSS.
[5] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[6] Laurens van der Maaten,et al. Accelerating t-SNE using tree-based algorithms , 2014, J. Mach. Learn. Res..
[7] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[8] Yicong Zhou,et al. Learning Hierarchical Spectral–Spatial Features for Hyperspectral Image Classification , 2016, IEEE Transactions on Cybernetics.
[9] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[10] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[11] Konstantin Böttinger. Guiding a Colony of Black-Box Fuzzers with Chemotaxis , 2017, 2017 IEEE Security and Privacy Workshops (SPW).
[12] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[13] William K. Robertson,et al. LAVA: Large-Scale Automated Vulnerability Addition , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[14] Jie Du,et al. Novel Efficient RNN and LSTM-Like Architectures: Recurrent and Gated Broad Learning Systems and Their Applications for Text Classification , 2020, IEEE Transactions on Cybernetics.
[15] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[16] Xinli Yang,et al. Deep Learning for Just-in-Time Defect Prediction , 2015, 2015 IEEE International Conference on Software Quality, Reliability and Security.
[17] Chao Zhang,et al. MOPT: Optimized Mutation Scheduling for Fuzzers , 2019, USENIX Security Symposium.
[18] Ningning Tong,et al. DIOD: Fast and Efficient Weakly Semi-Supervised Deep Complex ISAR Object Detection , 2019, IEEE Transactions on Cybernetics.
[19] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[20] Bihuan Chen,et al. Hawkeye: Towards a Desired Directed Grey-box Fuzzer , 2018, CCS.
[21] Mathias Payer,et al. T-Fuzz: Fuzzing by Program Transformation , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[22] Zhang Yi,et al. A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System , 2019, IEEE Transactions on Cybernetics.
[23] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[24] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[25] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2016, IEEE Transactions on Software Engineering.
[26] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[27] Kevin Chen-Chuan Chang,et al. A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications , 2017, IEEE Transactions on Knowledge and Data Engineering.
[28] Martin White,et al. Toward Deep Learning Software Repositories , 2015, 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories.
[29] Fu-Lai Chung,et al. Deep Network Embedding for Graph Representation Learning in Signed Networks , 2019, IEEE Transactions on Cybernetics.
[30] Heng Yin,et al. Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.
[31] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[32] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[33] Abhik Roychoudhury,et al. Directed Greybox Fuzzing , 2017, CCS.
[34] Chao Zhang,et al. CollAFL: Path Sensitive Fuzzing , 2018, 2018 IEEE Symposium on Security and Privacy (SP).