A Call for Mandatory Input Validation and Fuzz Testing
暂无分享,去创建一个
[1] Yasir Javed,et al. An In-Depth Survey of Bypassing Buffer Overflow Mitigation Techniques , 2022, Applied Sciences.
[2] Chen Chen,et al. A systematic review of fuzzing techniques , 2018, Comput. Secur..
[3] Fang Yu,et al. String Analysis for Software Verification and Security , 2018, Springer International Publishing.
[4] Chaojing Tang,et al. Protocol vulnerability detection based on network traffic analysis and binary reverse engineering , 2017, PloS one.
[5] Bertrand Meyer,et al. Applying 'design by contract' , 1992, Computer.
[6] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[7] Eugene H. Spafford,et al. Crisis and aftermath , 1989, Commun. ACM.
[8] Phil McMinn,et al. Automatic generation of valid and invalid test data for string validation routines using web searches and regular expressions , 2015, Sci. Comput. Program..