共 247 条
[52]
Directed Greybox Fuzzing
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2329-2344
[53]
Bounimova E, 2013, PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), P122, DOI 10.1109/ICSE.2013.6606558
[54]
Boyer R. S., 1975, SIGPLAN Notices, V10, P234, DOI 10.1145/390016.808445
[55]
Bratus S., 2008, TR2008634 DARTM COLL
[56]
Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:114-129
[57]
Bruening D. L., 2004, THESIS MASSACHUSETTS
[58]
Budi A, 2011, PLDI 11: PROCEEDINGS OF THE 2011 ACM CONFERENCE ON PROGRAMMING LANGUAGE DESIGN AND IMPLEMENTATION, P447
[59]
Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware
[J].
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10),
2010,
:413-425
[60]
Caballero J, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P317