共 28 条
[1]
Serebryany K., Continuous fuzzing with LibFuzzer and AddressSanitizer, Proc. of the 2016 IEEE Cybersecurity Development (SecDev), (2016)
[2]
Bohme M, Pham VT, Nguyen MD, Roychoudhury A., Directed greybox fuzzing, Proc. of the 2017 ACM SIGSAC Conf. on Computer and Communications Security, pp. 2329-2344, (2017)
[3]
Chen HX, Xue YX, Li YK, Chen BH, Xie XF, Wu XH, Liu Y., Hawkeye: Towards a desired directed grey-box fuzzer, Proc. of the 2018 ACM SIGSAC Conf. on Computer and Communications Security, pp. 2095-2108, (2018)
[4]
Wen C, Wang HJ, Li YK, Qin SC, Liu Y, Xu ZW, Chen HX, Xie XF, Pu GG, Liu T., MemLock: Memory usage guided fuzzing, Proc. of the 42nd Int’l Conf. on Software Engineering, pp. 765-777, (2020)
[5]
Petsios T, Zhao J, Keromytis AD, Jana S., SlowFuzz: Automated domain-independent detection of algorithmic complexity vulnerabilities, Proc. of the 2017 ACM SIGSAC Conf. on Computer and Communications Security, pp. 2155-2168, (2017)
[6]
Jeong DR, Kim K, Shivakumar B, Lee B, Shin I., Razzer: Finding kernel race bugs through fuzzing, Proc. of the 2019 IEEE Symp. on Security and Privacy (SP), pp. 754-768, (2019)
[7]
Xu M, Kashyap S, Zhao HQ, Kim T., Krace: Data race fuzzing for kernel file systems, Proc. of the 2020 IEEE Symp. on Security and Privacy (SP), pp. 1643-1660, (2020)
[8]
Rawat S, Jain V, Kumar A, Cojocar L, Giuffrida C, Bos H., VUzzer: Application-aware evolutionary fuzzing, Proc. of the 24th Annual Network and Distributed System Security Symp, pp. 1-14, (2017)
[9]
Li YK, Chen BH, Chandramohan M, Lin SW, Liu Y, Tiu A., Steelix: Program-state based binary fuzzing, Proc. of the 11th Joint Meeting on Foundations of Software Engineering, pp. 627-637, (2017)
[10]
Aschermann C, Schumilo S, Blazytko T, Gawlik R, Holz T., REDQUEEN: Fuzzing with input-to-state correspondence, Proc. of the 26th Annual Network and Distributed System Security Symp, pp. 1-15, (2019)