[1] |
中国国家漏洞库[EB/OL]..2013.
|
[2] |
BARTON M , LOUIS F , BRYAN S . An empirical study of there liability of UNIX utilities[J]. Communications of the Association for Computing Machinery, 1990,33(12): 32-44.
|
[3] |
JUSTIN F , BARTON M . An empirical study of the robustness of Windows NT applications using random testing[A]. Proceedings of the 4th USENIX Windows System Symposium[C]. Berkeley:USENIX Association, 2000. 1-6.
|
[4] |
AITEL D . The Advantage of Block-Based Protocol Analysis for Security Testing[R]. Miami Beach:Immunity Inc, 2002.
|
[5] |
何永君 . 基于动态二进制分析的网络协议逆向解析[D]. 郑州:解放军信息工程大学, 2010. HE Y J . Network Protocol Reverse Parsing Based on Dynamic Binary Analysis[D]. Zhengzhou:PLA Information Engineering University, 2010.
|
[6] |
WANG T , WEI T , GU G ,et al. TaintScope:a checksum-aware directed fuzz testing tool for automatic software vulnerability detection[A]. Proceedings of the IEEE Symposium on Security and Privacy[C]. Oakland,CA, 2010. 497-512.
|
[7] |
SUTTON M , GREENE A , AMINI P . Fuzz testing:Brute Force Vulnerability Discovery[D]. Addison-Wesley Professional, 2007. 13-15.
|
[8] |
IOZZO V . Knowledge fuzz testing[A]. Proceedings of the Black Hat[C]. 2010.
|
[9] |
吴志勇, 夏建军, 孙乐昌 . 多维Fuzz testing技术综述[J]. 计算机应用研究, 2010,27(8): 2810-2872. WU Z Y , XIA J J , SUN L C . Survey of multi-dimensional fuzz testing technology[J]. Application Research of Computers, 2010,27(8): 2810-2872.
|
[10] |
EVANS D , LAROCHELLE D . Improving security using extensible lightweight static analysis[J]. IEEE Software, 2002,19(1): 42-50.
|