Computer Science ›› 2022, Vol. 49 ›› Issue (5): 318-324.doi: 10.11896/jsjkx.210300281
• Information Security • Previous Articles Next Articles
HU Zhi-hao, PAN Zu-lie
CLC Number:
[1]LI J,ZHAO B,ZHANG C.Fuzzing:asurvey[J].Cybersecurity,2018,1(1):1-13. [2]COHEN M B,SNYDER J,ROTHERMEL G.Testing acrossconfigurations:implications for combinatorial testing[J].ACM SIGSOFT Software Engineering Notes,2006,31(6):1-9. [3]LIANG H,PEI X,JIA X,et al.Fuzzing:State ofthe art[J].IEEE Transactions on Reliability,2018,67(3):1199-1218. [4]PEACHTEC.Peach[EB/OL].(2017-10-06)[2021-04-17].http://www.peachfuzzer.com/products/peach-platform. [5]Beyond Security.beSTORM[EB/OL].(2021-04-17)[2021-04-17].https://beyondsecurity.com/solutions/bestorm.html. [6]PHAM V T,BÖHME M,ROYCHOUDHURY A.AFLNet:agreybox fuzzer for network protocols[C]//2020 IEEE 13th International Conference onSoftware Testing,Validation and Verification(ICST).IEEE,2020:460-465. [7]LI M L,HUANG H,LU Y L.Test Case Generation Technology Based on Symbol Divideand Conquer Area for Vulnerability Mining[J].Netinfo Security,2020,20(5):39-46. [8]GONG W,ZHANG G,ZHOU X.Learn to Accelerate Identif-ying New Test Cases in Fuzzing[C]//International Conference on Security,Pri-vacy and Anonymity in Computation,Communication and Storage.Cham:Springer,2017:298-307. [9]KARAMCHETI S,MANN G,ROSENBERG D.ImprovingGrey-Box Fuzzing by Modeling Program Behavior[J].arXiv:1811.08973,2018. [10]ZONG P,LV T,WANG D,et al.Fuzzguard:Filteringout un-reachable inputs in directed grey-box fuzzing through deep learning[C]//29th Security Symposium (USENIX).2020:2255-2269. [11]ZHANG X,LI Z J.Surveyof Fuzz TestingTechnology[J].Computer Science,2016,43(5):1-8,26. [12]JIANG Y G,CHEN X,LI J B,et al.A FuzzyTest Case Generation Method based on LSTM for S7 Protocol[J].Computer Engineering,2021,47(7):183-188. [13]ZALEWSKI M.American fuzzy lop[EB/OL].(2017-11-05)[2021-04-17].https://github.com/mirrorer/afl. [14]LCAMTUF.AFL fuzzing strategies[EB/OL].(2014-08-08)[2021-04-17].https://lcamtuf.blogspot.jp/2014/08/binary-fuzzing-strategies-what-works.html. [15]SCHMIDHUBER J.Gradient Flow in RecurrentNets:the Difficulty of Learning Long-Term Dependencies[M]//Wiley-IEEE Press,2001. [16]HOCHREITER S,SCHMIDHUBER J.Long Short-Term Me-mory[J].Neural Computation,1997,9(8):1735-1780. [17]BRADBURY J,MERITY S,XIONG C,et al.Quasi-recu-rrent neural networks[J].arXiv:1611.01576,2016. [18]LOU Y X,YUAN W H,PENG R Q.Speech EnhancementMethod Based on Quasi Recurrent Neural Network[J].Computer Engineering,2020,46(4):316-320. [19]WANG Y,JIA P,LIU L,et al.A systematic reviewof fuzzingbased on machine learning techniques[J].PLoS ONE,2020,15(8):e0237749. [20]QIU X P.Neural Networks and Deep Learning[M].Beijing:China Machine Press,2020. [21]ZHOU Y H.Research on Network Protocol Vulnerability Mining Method Based on Deep Learning[D].Chengdu:University of Electronic Science and Technology of China,2020. [22]XU L L,CHI D X.Machine learning classification strategy for imbalanced data sets[J].Computer Engineeringand Applications,2020,56(24):12-27. [23]BIND 9[EB/OL].(2004-01-28)[2021-04-17].https://www.isc.org/bind/. |
[1] | XU Yong-xin, ZHAO Jun-feng, WANG Ya-sha, XIE Bing, YANG Kai. Temporal Knowledge Graph Representation Learning [J]. Computer Science, 2022, 49(9): 162-171. |
[2] | RAO Zhi-shuang, JIA Zhen, ZHANG Fan, LI Tian-rui. Key-Value Relational Memory Networks for Question Answering over Knowledge Graph [J]. Computer Science, 2022, 49(9): 202-207. |
[3] | TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305. |
[4] | SUN Qi, JI Gen-lin, ZHANG Jie. Non-local Attention Based Generative Adversarial Network for Video Abnormal Event Detection [J]. Computer Science, 2022, 49(8): 172-177. |
[5] | WANG Jian, PENG Yu-qi, ZHAO Yu-fei, YANG Jian. Survey of Social Network Public Opinion Information Extraction Based on Deep Learning [J]. Computer Science, 2022, 49(8): 279-293. |
[6] | HAO Zhi-rong, CHEN Long, HUANG Jia-cheng. Class Discriminative Universal Adversarial Attack for Text Classification [J]. Computer Science, 2022, 49(8): 323-329. |
[7] | JIANG Meng-han, LI Shao-mei, ZHENG Hong-hao, ZHANG Jian-peng. Rumor Detection Model Based on Improved Position Embedding [J]. Computer Science, 2022, 49(8): 330-335. |
[8] | HOU Yu-tao, ABULIZI Abudukelimu, ABUDUKELIMU Halidanmu. Advances in Chinese Pre-training Models [J]. Computer Science, 2022, 49(7): 148-163. |
[9] | ZHOU Hui, SHI Hao-chen, TU Yao-feng, HUANG Sheng-jun. Robust Deep Neural Network Learning Based on Active Sampling [J]. Computer Science, 2022, 49(7): 164-169. |
[10] | SU Dan-ning, CAO Gui-tao, WANG Yan-nan, WANG Hong, REN He. Survey of Deep Learning for Radar Emitter Identification Based on Small Sample [J]. Computer Science, 2022, 49(7): 226-235. |
[11] | HU Yan-yu, ZHAO Long, DONG Xiang-jun. Two-stage Deep Feature Selection Extraction Algorithm for Cancer Classification [J]. Computer Science, 2022, 49(7): 73-78. |
[12] | CHENG Cheng, JIANG Ai-lian. Real-time Semantic Segmentation Method Based on Multi-path Feature Extraction [J]. Computer Science, 2022, 49(7): 120-126. |
[13] | LIU Wei-ye, LU Hui-min, LI Yu-peng, MA Ning. Survey on Finger Vein Recognition Research [J]. Computer Science, 2022, 49(6A): 1-11. |
[14] | SUN Fu-quan, CUI Zhi-qing, ZOU Peng, ZHANG Kun. Brain Tumor Segmentation Algorithm Based on Multi-scale Features [J]. Computer Science, 2022, 49(6A): 12-16. |
[15] | KANG Yan, XU Yu-long, KOU Yong-qi, XIE Si-yu, YANG Xue-kun, LI Hao. Drug-Drug Interaction Prediction Based on Transformer and LSTM [J]. Computer Science, 2022, 49(6A): 17-21. |
|