1 |
MANèS V J M, HAN H, HAN C, et al. The art, science, and engineering of fuzzing: a survey[J]. IEEE Transactions on Software Engineering, 2021, 47(11): 2312-2331.
|
2 |
PHAM V T, B?HME M, ROYCHOUDHURY A. AFLNet: a greybox fuzzer for network protocols[C]//Proceedings of the 2020 IEEE 13th International Conference on Software Testing, Validation and Verification. Piscataway: IEEE Press, 2020: 460-465.
|
3 |
BA J S, MARCEL B, ZAHRA M, et al. Stateful greybox fuzzing[C]//Proceedings of USENIX Security Symposium. Boston: USENIX Association, 2022: 3255-3272.
|
4 |
MILLER B P, FREDRIKSEN L, SO B. An empirical study of the reliability of UNIX utilities[J]. Communications of the ACM, 1990, 33(12): 32-44.
|
5 |
KAKSONEN R, LAAKSO M, TAKANEN A. System security assessment through specification mutations and fault injection[C]//Proceedings of the IFIP TC6/TC11 International Conference on Communications and Multimedia Security Issues of the New Century. New York: ACM, 2001: 173-183.
|
6 |
LUO Z X, YU J Z, ZUO F L, et al. Bleem: packet sequence oriented fuzzing for protocol implementations[C]//Proceedings of USENIX Security Symposium. Anaheim: USENIX Association, 2023: 4481-4498.
|
7 |
NATELLA R. StateAFL: greybox fuzzing for stateful network servers[J]. Empirical Software Engineering, 2022, 27(7): 191.
|
8 |
ANDRONIDIS A, CADAR C. SnapFuzz: high-throughput fuzzing of network applications[C]//Proceedings of the 31st ACM Sigsoft International Symposium on Software Testing and Analysis. New York: ACM, 2022: 340-351.
|
9 |
LI J Q, LI S Y, SUN G, et al. SNPSFuzzer: a fast greybox fuzzer for stateful network protocols using snapshots[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 2673-2687.
|
10 |
QIN S S, HU F, MA Z Y, et al. NSFuzz: towards efficient and state-aware network service fuzzing[J]. ACM Transactions on Software Engineering and Methodology, 2023, 32(6): 160.
|
11 |
LIU D G, PHAM V T, ERNST G, et al. State selection algorithms and their impact on the performance of stateful network protocol fuzzing[C]//Proceedings of the 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). Piscataway: IEEE Press, 2022: 720-730.
|
12 |
LIU D G, ERNST G, MURRAY T, et al. Legion: best-first concolic testing (competition contribution)[C]// Proceedings of International Conference on Fundamental Approaches to Software Engineering. Cham: Springer, 2020: 545-549.
|
13 |
HARKINS D, CARREL D. The Internet Key Exchange (IKE) [S]. RFC 2409, 1998: 1-41.
|
14 |
KAUFMAN C, HOFFMAN P, NIR Y, et al. Internet Key Exchange Protocol Version 2 (IKEv2) [S]. RFC 7296, 2014: 1-142.
|
15 |
MAUGHAN D, SCHERTLER M, SCHNEIDER M, et al. Internet Security Association and Key Management Protocol (ISAKMP) [S]. RFC 2408, 1998: 1-86.
|
16 |
WU M Y, JIANG L, XIANG J H, et al. One fuzzing strategy to rule them all[C]//Proceedings of the 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE). Piscataway: IEEE Press, 2022: 1634-1645.
|
17 |
DE RUITER J, POLL E. Protocol state fuzzing of TLS implementations[C]//Proceedings of USENIX Security Symposium (USENIX Security 15). Washington: USENIX Association, 2015: 193-206.
|
18 |
ANGLUIN D. Learning regular sets from queries and counterexamples[J]. Information and Computation, 1987, 75(2): 87-106.
|
19 |
JAUERNIG P, JAKOBOVIC D, PICEK S, et al. DARWIN: survival of the fittest fuzzing mutators[J]. arXiv Preprint: arXiv: , 2022.
|
20 |
NATELLA R, PHAM V T. ProFuzzBench: a benchmark for stateful protocol fuzzing[C]//Proceedings of the 30th ACM Sigsoft International Symposium on Software Testing and Analysis. New York: ACM, 2021: 662-665.
|
21 |
TSANKOV P, DASHTI M T, BASIN D. SECFuzz: Fuzz-testing security protocols[C]//Proceedings of the 2012 7th International Workshop on Automation of Software Test (AST). Piscataway: IEEE Press, 2012: 1-7.
|
22 |
TEAN P, JANSSEN R, VAANDRAGER F. Combining model learning and model checking to analyze TCP implementations[C]// Proceedings of International Conference on Computer Aided Verification. Cham: Springer, 2016: 454-471.
|
23 |
FITER?U-BRO?TEAN P, LENAERTS T, POLL E, et al. Model learning and model checking of SSH implementations[C]//Proceedings of the 24th ACM Sigsoft International SPIN Symposium on Model Checking of Software. New York: ACM, 2017: 142-151.
|
24 |
GUO J X, GU C X, CHEN X, et al. Model learning and model checking of IPSec implementations for internet of things[J]. IEEE Access, 2019, 7: 171322-171332.
|
25 |
KLEES G, RUEF A, COOPER B, et al. Evaluating fuzz testing[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018: 2123-2138.
|