Driller: Augmenting Fuzzing Through Selective Symbolic Execution
暂无分享,去创建一个
Christopher Krügel | Giovanni Vigna | Ruoyu Wang | Yan Shoshitaishvili | Christopher Salls | Jacopo Corbetta | Nick Stephens | Andrew Dutcher | John Grosen | Yan Shoshitaishvili | Ruoyu Wang | Christopher Salls | Nick Stephens | Andrew Dutcher | John Grosen | Christopher Krügel | Giovanni Vigna | Jacopo Corbetta | G. Vigna | Christopher Krügel
[1] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[2] Brian S. Pak,et al. Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution , 2012 .
[3] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[4] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Herbert Bos,et al. The BORG: Nanoprobing Binaries for Buffer Overreads , 2015, CODASPY.
[6] Patrice Godefroid,et al. SAGE: Whitebox Fuzzing for Security Testing , 2012, ACM Queue.
[7] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Will Drewry,et al. Flayer: Exposing Application Internals , 2007, WOOT.
[9] Dawson R. Engler,et al. Under-constrained execution: making automatic code destruction easy and scalable , 2007, ISSTA '07.
[10] Koushik Sen,et al. DART: directed automated random testing , 2005, PLDI '05.
[11] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[12] Martin C. Rinard,et al. Taint-based directed whitebox fuzzing , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[13] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[14] Tricia Moyer,et al. Capture the Flag , 2015 .
[15] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[16] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[17] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX Annual Technical Conference, FREENIX Track.
[18] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[19] Stephen McCamant,et al. Transformation-aware Exploit Generation using a HI-CFG , 2013 .
[20] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[21] Raymond Lister,et al. Grand challenges , 2005, SGCS.
[22] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[23] Alex Groce,et al. Taming compiler fuzzers , 2013, ACM-SIGPLAN Symposium on Programming Language Design and Implementation.
[24] Stefan Bucur,et al. Improving Scalability of Symbolic Execution for Software with Complex Environment Interfaces , 2015 .