Computer Science ›› 2013, Vol. 40 ›› Issue (10): 108-113.
Previous Articles Next Articles
LI Cheng,WEI Qiang,PENG Jian-shan and WANG Qing-xian
[1] ProxyFuzz [EB/OL].http://www.darknet.org.uk/2007/06/proxyfuzz-mitm-network-fuzzer-in-python/ [2] SPIKE Proxy[EB/OL].http://www.immunitysec.com/resou-rcesfreesoftware [3] 李伟明,张爱芳,刘建.网络协议的自动化模糊测试漏洞挖掘方法[J].计算机学报,2010,34(2):242-255 [4] Milani C P,Gilbert W,Christopher K,et al.Prospex:protocol specification extraction[C]∥Proc.of the 30th IEEE Symposium on Security and Privacy.Oakland,California,USA,2009:110-125 [5] Tsankov P,Dashti M T,Basin D.SECFUZZ:Fuzz-testing securi-ty protocols[C]∥Proc.of the 7th International Workshop on Automation of Software Test(AST).Zurich,Switzerland,2012 [6] Caballero J,Johnson N,McCamant S,et al.Binary code extraction and interface identification for security applications[C]∥Proc of the 16th ACM Conference on Computer and Communications Security(CCS).Chicago,USA,2009 [7] Wang T,Wei T, Zou W.TaintScope:a checksum-aware directed fuzzing tool for automatic software vulnerability detection[C]∥Proc.of the 31st IEEE Symposium on Security & Privacy(S&P).Oakland,California,USA,2010 [8] Godefroid P,Levin M Y,Molnar D.Automated whitebox fuzz testing[C]∥Proc.of the 16th Network and Distributed System Security(NDSS).California,USA,2008 [9] 过辰楷,姬秀娟,许静.基于分支混淆算法的符号执行技术[J].计算机科学,2012,39(9):115-119 [10] Cui Bao-jiang,Ji Yu-peng,Wang Jian-xin.An instruction-levelsymbolic checksum system for windows x86program[J].Chinese Journal of Electronics,2012,21(1):23-26 [11] Caballero J,Poosankam P,McCamant S.Input generation via decomposition and re-stitching:finding bugs in malware[C]∥Proc.of the 18th ACM Conference on Comput Communications Security(CCS).Chicago,USA,2010 [12] Ganesh V,Leek T,Rinard M.Taint-based directed whiteboxfuzzing[C]∥Proc.of the 31st International Conference on Software Engineering.Vancouver,Canada,2009 [13] Kang M G,McCaman S,Poosankam P,et al.DTA++ dynamic taint analysis with targeted control-flow propagation[C]∥Proc of the 18th Annual Network and Distributed System Security Symposium(NDSS).San Diego,California,USA,2011 [14] Felix G,Carsten W,Thorsten H.Automatic identification ofcryptographic primitives in binary programs[C]∥Symposium on 14thRecent Advances in Intrusion Detection(RAID).Menlo Park,California,2011 [15] Brumley D,Jager I,Avgerinos T,et al.BAP:The CMU binary analysis platform[C]∥ Proc.of the 23rd Conference on Computer Aided Verification(CAV).Snowbird,UT,2011 [16] Ganish V,Dill D.STP:A decision procedure for bit-vectors and arrays[C]∥Proc.of the 19th International Conference on computer Aided Verification.Berlin,Germany,2007 [17] In Memory Fuzzing [EB/OL].https://www.corelan.be/in-dex.php/2010/10/20/in-memory-fuzzing/ [18] PIN-A Dynamic Binary Instrumentation Tool [CP/OL].ht-tp://www.pintool.org |
No related articles found! |
|