[1] |
SUTTON M , GREENE A , AMINI P . Fuzzing:brute force vulnerability discovery[M]. NJ: Pearson EducationPress, 2007.
|
[2] |
CHEN C , CUI B , MA J ,et al. A systematic review of fuzzing techniques[J]. Computers & Security, 2018,75(1): 118-137.
|
[3] |
RAWAT S , JAIN V , KUMAR A ,et al. VUzzer:application-aware evolutionary fuzzing[C]// ISOC Network and Distributed System Security Symposium. ISOC, 2017: 1-14.
|
[4] |
B?HME M , PHAM V T , NGUYEN M D ,et al. Directed greybox fuzzing[C]// ACM Conference on Computer and Communications Security. ACM, 2017: 2329-2344
|
[5] |
CHEN H , XUE Y , LI Y ,et al. Hawkeye:towards a desired directed grey-box fuzzer[C]// ACM Conference on Computer and Communications Security. ACM, 2018: 2095-2108.
|
[6] |
STEPHENS N , GROSEN J , SALLS C ,et al. Driller:augmenting fuzzing through selective symbolic execution[C]// ISOC Network and Distributed System Security Symposium. ISOC, 2016: 1-16.
|
[7] |
SHOSHITAISHVILI Y , WANG R , SALLS C ,et al. Sok:state of the art of war:offensive techniques in binary analysis[C]// IEEE Symposium on Security and Privacy. IEEE, 2016: 138-157.
|
[8] |
OGNAWALA S , KILGER F , PRETSCHNER A . Compositional fuzzing aided by targeted symbolic execution[J]. arXiv Preprint,arXiv:1903.02981, 2019.
|
[9] |
CADAR C , DUNBAR D , ENGLER D R . KLEE:unassisted and automatic generation of high-coverage tests for complex systems programs[C]// USENIX Symposium on Operating Systems Design and Implementation. USENIX, 2008: 209-224.
|
[10] |
孙鸿宇, 何远, 王基策 ,等. 人工智能技术在安全漏洞领域的应用[J]. 通信学报, 2018,39(8): 1-17.
|
|
SUN H Y , HE Y , WANG J C ,et al. Application of artificial intelligence technology in the field of security vulnerability[J]. Journal on Communications, 2018,39(8): 1-17.
|
[11] |
GODEFROID P , PELEG H , SINGH R . Learn & fuzz:machine learning for input fuzzing[C]// IEEE/ACM International Conference on Automated Software Engineering. IEEE/ACM, 2017: 50-59.
|
[12] |
WANG J , CHEN B , WEI L ,et al. Skyfire:Data-driven seed generation for fuzzing[C]// IEEE Symposium on Security and Privacy. IEEE, 2017: 579-594.
|
[13] |
GAN S , ZHANG C , QIN X ,et al. CollAFL:path sensitive fuzzing[C]// IEEE Symposium on Security and Privacy. IEEE, 2018: 679-696.
|
[14] |
KLEES G , RUEF A , COOPER B ,et al. Evaluating fuzz testing[C]// ACM Conference on Computer and Communications Security. ACM, 2018: 2123-2138.
|
[15] |
DOLAN-GAVITT B , HULIN P , KIRDA E ,et al. Lava:large-scale automated vulnerability addition[C]// IEEE Symposium on Security and Privacy. IEEE, 2016: 110-121.
|
[16] |
LI J , ZHAO B , ZHANG C . Fuzzing:a survey[J]. Cybersecurity, 2018,1(1):6.
|
[17] |
>B?HME M , PHAM V T , Roychoudhury A . Coverage-based greybox fuzzing as Markov chain[C]// ACM Conference on Computer and Communications Security. ACM, 2016: 1032-1043.
|
[18] |
WANG M , LIANG J , CHEN Y ,et al. SAFL:increasing and accelerating testing coverage with symbolic execution and guided fuzzing[C]// International Conference on Software Engineering. 2018: 61-64.
|
[19] |
王志, 蔡亚运, 刘露 ,等. 基于覆盖率分析的僵尸网络控制命令发掘方法[J]. 通信学报, 2014,35(1): 156-166.
|
|
WANG Z , CAI Y Y , LIU L ,et al. Using coverage analysis to extract Botnet command-and-control protocol[J]. Journal on Communications, 2014,35(1): 156-166.
|