A hybrid symbolic execution assisted fuzzing method
暂无分享,去创建一个
[1] Pedram Amini,et al. Fuzzing: Brute Force Vulnerability Discovery , 2007 .
[2] Sarfraz Khurshid,et al. Symbolic execution for software testing in practice: preliminary assessment , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[3] Koushik Sen. DART: Directed Automated Random Testing , 2009, Haifa Verification Conference.
[4] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[5] Corina S. Pasareanu,et al. A survey of new trends in symbolic execution for software testing and analysis , 2009, International Journal on Software Tools for Technology Transfer.
[6] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[7] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Athanasios Avgerinos,et al. Exploiting Trade-offs in Symbolic Execution for Identifying Security Bugs , 2014 .
[9] Herbert Bos,et al. The BORG: Nanoprobing Binaries for Buffer Overreads , 2015, CODASPY.
[10] David Brumley,et al. Enhancing symbolic execution with veritesting , 2014, ICSE.
[11] Brian S. Pak,et al. Hybrid Fuzz Testing: Discovering Software Bugs via Fuzzing and Symbolic Execution , 2012 .
[12] Xiaoyin Wang,et al. Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE , 2015, ISSTA.
[13] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[14] Dawson R. Engler,et al. EXE: automatically generating inputs of death , 2006, CCS '06.
[15] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[16] Barton P. Miller,et al. An empirical study of the reliability of UNIX utilities , 1990, Commun. ACM.
[17] Koushik Sen,et al. CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools , 2006, CAV.
[18] Koushik Sen,et al. Symbolic execution for software testing: three decades later , 2013, CACM.
[19] Patrice Godefroid,et al. Automated Whitebox Fuzz Testing , 2008, NDSS.
[20] Herbert Bos,et al. VUzzer: Application-aware Evolutionary Fuzzing , 2017, NDSS.
[21] Herbert Bos,et al. Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations , 2013, USENIX Security Symposium.
[22] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.
[23] Fabrice Bellard,et al. QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.
[24] Martin C. Rinard,et al. Taint-based directed whitebox fuzzing , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[25] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[26] Abhik Roychoudhury,et al. Coverage-Based Greybox Fuzzing as Markov Chain , 2017, IEEE Trans. Software Eng..
[27] Rupak Majumdar,et al. Hybrid Concolic Testing , 2007, 29th International Conference on Software Engineering (ICSE'07).