[1] |
孙鸿宇, 何远, 王基策 ,等. 人工智能技术在安全漏洞领域的应用[J]. 通信学报, 2018,39(8): 1-17.
|
|
UN H Y , HE Y , WANG J C ,et al. Application of artificial intelligence technology in the field of security vulnerability[J]. Journal on Communications, 2018,39(8): 1-17.
|
[2] |
SONG J , ALVES-FOSS J , . The DARPA cyber grand challenge:a competitor’s perspective[J]. IEEE Security & Privacy, 2015,13(6): 72-76.
|
[3] |
BRUMLEY D , POOSANKAM P , SONG D ,et al. Automatic patch-based exploit generation is possible:techniques and implications[C]// Proceedings of 2008 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2008: 143-157.
|
[4] |
AVGERINOS T , CHA S K , HAO B L T ,et al. AEG:automatic exploit generation[C]// Network and Distributed System Security Symposium. San Diego:DBLP, 2011: 1-18.
|
[5] |
AVGERINOS T , CHA S K , REBERT A ,et al. Automatic exploit generation[J]. Communications of the ACM, 2014,57(2): 74-84.
|
[6] |
CHA S K , AVGERINOS T , REBERT A ,et al. Unleashing mayhem on binary code[C]// 2012 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2012: 380-394.
|
[7] |
WANG M H , SU P R , LI Q ,et al. Automatic polymorphic exploit generation for software vulnerabilities[C]// Security and Privacy in Communication Networks. Cham:Springer, 2013: 216-233.
|
[8] |
HUANG S K , HUANG M H , HUANG P Y ,et al. CRAX:software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations[C]// Proceedings of 2012 IEEE Sixth International Conference on Software Security and Reliability. Piscataway:IEEE Press, 2012: 78-87.
|
[9] |
HE L , CAI Y , HU H ,et al. Automatically assessing crashes from heap overflows[C]// Proceedings of 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE). Piscataway:IEEE Press, 2017: 274-279.
|
[10] |
WANG Y , ZHANG C , XIANG X B ,et al. Revery:from proof-of-concept to exploitable[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 1914-1927.
|
[11] |
WU W , CHEN Y , XU J ,et al. FUZE:towards facilitating exploit generation for kernel use-after-free vulnerabilities[C]// Proceedings of the 27th USENIX Security Symposium. Berkeley:USENIX Association, 2018: 781-797.
|
[12] |
方皓, 吴礼发, 吴志勇 . 基于符号执行的 Return-to-dl-resolve 利用代码自动生成方法[J]. 计算机科学, 2019,46(2): 127-132.
|
|
FANG H , WU L F , WU Z Y . Automatic return-to-dl-resolve exploit generation method based on symbolic execution[J]. Computer Science, 2019,46(2): 127-132.
|
[13] |
HU H , CHUA Z L , ADRIAN S ,et al. Automatic generation of data-oriented exploits[C]// Proceedings of the 24th USENIX Security Symposium. Berkeley:USENIX Association, 2015: 177-192.
|
[14] |
HU H , SHINDE S , ADRIAN S ,et al. Data-oriented programming:on the expressiveness of non-control data attacks[C]// Proceedings of 2016 IEEE Symposium on Security and Privacy. Piscataway:IEEE Press, 2016: 969-986.
|
[15] |
ISPOGLOU K K , ALBASSAM B , JAEGER T ,et al. Block oriented programming:automating data-only attacks[C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York:ACM Press, 2018: 1868-1882.
|
[16] |
SCHWARTZ E J , AVGERINOS T , BRUMLEY D ,et al. Q:exploit hardening made easy[C]// Proceedings of the 20th USENIX Security Symposium. Berkeley:USENIX Association, 2011:25.
|
[17] |
黄桦烽, 王嘉捷, 杨轶 ,等. 有限资源条件下的软件漏洞自动挖掘与利用[J]. 计算机研究与发展, 2019,56(11): 2299-2314.
|
|
HUANG H F , WANG J J , YANG Y ,et al. Automatic software vulnerability discovery and exploit under the limited resource conditions[J]. Journal of Computer Research and Development, 2019,56(11): 2299-2314.
|