|
參考文獻 [1] Common vulnerabilities and exposures. Available: http://cve.mitre.org/ [2] T. M. Bezenek and D. Wright, "Using Fuzz to Test the Reliability of Unix Kernels," 1996. [3] S. Hocevar, "zzuf—multi-purpose fuzzer," ed, 2011. [4] M. Eddington, "Peach fuzzing platform," Peach Fuzzer, 2011. [5] 鍾翔 and 黃世昆, "具目標認知符號執行模糊測試框架," 2013. [6] J. C. King, "Symbolic execution and program testing," Communications of the ACM, vol. 19, pp. 385-394, 1976. [7] V. Ganesh and D. L. Dill, "A decision procedure for bit-vectors and arrays," in Computer Aided Verification, 2007, pp. 519-531. [8] L. De Moura and N. Bj#westeur057#rner, "Z3: An efficient SMT solver," in Tools and Algorithms for the Construction and Analysis of Systems, ed: Springer, 2008, pp. 337-340. [9] S.-K. Huang, M.-H. Huang, P.-Y. Huang, C.-W. Lai, H.-L. Lu, and W.-M. Leong, "CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations," in Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on, 2012, pp. 78-87. [10] K. Sen, "Concolic testing," in Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering, 2007, pp. 571-572. [11] V. Chipounov, V. Kuznetsov, and G. Candea, S2E: A platform for in-vivo multi-path analysis of software systems vol. 39: ACM, 2011. [12] F. Bellard, "QEMU, a Fast and Portable Dynamic Translator," in USENIX Annual Technical Conference, FREENIX Track, 2005, pp. 41-46. [13] C. Cadar, D. Dunbar, and D. R. Engler, "KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs," in OSDI, 2008, pp. 209-224. [14] C. Lattner and V. Adve, "LLVM: A compilation framework for lifelong program analysis & transformation," in Code Generation and Optimization, 2004. CGO 2004. International Symposium on, 2004, pp. 75-86. [15] B. Martin, M. Brown, A. Paller, D. Kirby, and S. Christey, "2011 CWE/SANS top 25 most dangerous software errors," Common Weakness Enumeration, vol. 7515, 2011. [16] C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole, "Buffer overflows: Attacks and defenses for the vulnerability of the decade," in DARPA Information Survivability Conference and Exposition, 2000. DISCEX'00. Proceedings, 2000, pp. 119-129. [17] T. Newsham, "Format string attacks," ed, 2000. [18] P. Godefroid, M. Y. Levin, and D. A. Molnar, "Automated Whitebox Fuzz Testing," in NDSS, 2008, pp. 151-166. [19] T. Wang, T. Wei, G. Gu, and W. Zou, "TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection," in Security and Privacy (SP), 2010 IEEE Symposium on, 2010, pp. 497-512. [20] Basic Fuzzing Framework (BFF). Available: https://www.cert.org/vulnerability-analysis/tools/bff.cfm? [21] The CERT Division Available: https://www.cert.org/ [22] M. Woo, S. K. Cha, S. Gottlieb, and D. Brumley, "Scheduling black-box mutational fuzzing," in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, pp. 511-522. [23] A. Rebert, S. K. Cha, T. Avgerinos, J. Foote, D. Warren, G. Grieco, et al., "Optimizing seed selection for fuzzing," in Proceedings of the USENIX Security Symposium, 2014, pp. 861-875. [24] S. Sidiroglou-Douskos, E. Lahtinen, N. Rittenhouse, P. Piselli, F. Long, D. Kim, et al., "Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement," 2015. [25] Sudo. Available: http://www.sudo.ws/ [26] Xmail. Available: http://www.xmailserver.org/ [27] Socat. Available: http://www.dest-unreach.org/socat/ [28] Ncompress. Available: http://ncompress.sourceforge.net/ |