[1] |
崔光耀 . 启明星辰IPS突破Web防御僵局[J]. 信息安全与通信保密 2008(6):33.
|
|
CUI G Y . Venus IPS breakthrough Web defense deadlock[J]. In-formation Security and Communications Privacy, 2008(6):33.
|
[2] |
HUANG Y W , HUANG S K , LIN T P , et al. Web application security assessment by fault injection and behavior monitor-ing[C]//The 12th International World Wide Web Conference. New York, c2003:148-159.
|
[3] |
MILLER B . Project:operating system utility program reliabil-ity-the fuzz generator[EB/OL]. .
|
[4] |
OEHLERT P . Violating assumptions with fuzzing[J]. IEEE Security and Privacy, 2005,3(2):58-62.
|
[5] |
SUTTON M , GREENE A , AMINI P . Fuzzing:brute force vulner-ability discovery[M]. 2007.
|
[6] |
吴志勇, 王红川, 孙乐昌 , 等. Fuzzing技术综述[J]. 计算机应用研究, 2007,27(3):829-832.
|
|
WU Z Y , WANG H C , SUN L C , et al. Survey on fuzzing[J]. Ap-plication Research of Computers, 2007,27(3):829-832.
|
[7] |
MILLER B P , FREDRIKSEN L , SO B . An empirical study of the reliability of UNIX utilities[J]. Communications of the ACM, 1990,33(12):32-44.
|
[8] |
LIN J C , CHEN J M . An automated mechanism for secure input handing[J]. Journal of Computers, 2009,4(9):837-844.
|
[9] |
ERIKSSON B I , DAHL O E , BüLLER R , et al. A new oral direct thrombin inhibitor,dabigatran etexilate,compared with enoxaparin for prevention of thromboembolic events following total hip or knee replacement:the BISTROⅡ randomized trial[J]. Journal of Thrombosis and Haemostasis, 2005,3(1): 103-111.
|
[10] |
SPI Dynamics. Web application security assessment[R]. 2003.
|
[11] |
于莉莉, 杜蒙杉, 张平 , 等. Web 安全性测试技术综述[J]. 计算机应用研究 2012,29(29):4000-4002.
|
|
YU L L , DU M S , ZHANG P , et al. Survey on Web security testing technologies[J]. Application Research of Computers, 2012,29(29):4000-4002.
|
[9] |
HAMMERSLAND R , SNEKKENES E . Fuzz testing of Web ap-plications[EB/OL]. Journal of Computer and System Sciences, .
|
[14] |
GRAAF M D . Intelligent fuzzing of Web applications[D]. Amster-dam:University of Amsterdam, 2009.
|
|
STOECKEL D M , STELZER E A , DICK L K . Evaluation of two spike-and-recovery controls for assessment of extraction efficiency in microbial source tracking studies[J]. Water Research, 2009,43(19):4820-4827.
|
[15] |
都娟 . 基于模糊测试方法的 Web 应用安全性测试技术的研究及其工具实现[D]. 上海:华东师范大学, 2011.
|
|
DU J . Web application security testing technique based on fuzzing and implementation of the tool[D]. Shanghai:East China Normal University, 2011.
|
[16] |
刘为 . 基于模糊测试的XSS漏洞检测系统研究与实现[D]. 长沙:湖南大学, 2010.
|
|
LIU W . Research on and implementation of XSS vulnerability mining based on fuzzing technology[D]. Changsha:Hunan Univer-sity, 2010.
|
[17] |
Damn vulnerable Web application[EB/OL]. .
|
[18] |
Fuzzing:brute force vulnerability discovery[EB/OL]. .
|
[19] |
Web security[EB/OL]. .
|