[1] |
Goldfroid P, Klarund N. Sen K. DART: Directed automated random testing[C]// SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM Press, 2005: 213-223.
|
[2] |
Godefroid P, Levin M Y, Molnar D. Automated whitebox fuzz testing[C]// Proceedings of Network Distributed Security Symposium. San Diego, USA: The Internet Society, 2008: 151-166.
|
[3] |
Brumley D, Hartwig C, Kang M G, et al. BitScope: Automatically dissecting malicious binaries[R] Technical report CMU-CS-07-133, Carnegie Mellon University, 2007.
|
[4] |
Pǎsǎreanu C S, Mehlitz P C, Bushnell D H, et al. Combining unit-level symbolic execution and system-level concrete execution for testing NASA software[C]// Proceedings of the 2008 International Symposium on Software Testing and Analysis. Seattle, USA: ACM Press, 2008: 15-26.
|
[5] |
Hu C J, Li Z J , Ma J X, et al. File parsing vulnerability detection with symbolic execution[C]// Sixth International Symposium on Theoretical Aspects of Software Engineering. Beijing, China: IEEE Press, 2012: 135-142.
|
[6] |
Wang X, Chen H G, Jia Z H, et al. Improving integer security for systems with KINT[C]// Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. Berkeley, USA: USENIX-Association, 2012: 163-177.
|
[7] |
Chipounov V, GeorgescuV, Zamfir C, et al. Selective symbolic execution[C]// Proceedings of the 5th Workshop on Hot Topics in System Dependability. Lisbon, Portugal: ACM Press, 2009: 1-6.
|
[8] |
Siddiqui J H, Khurshid S. ParSym: Parallel symbolic execution[C]// 2nd International Conference on Software Technology and Engineering. San Juan, Puerto Rico: IEEE Press, 2010: 405-409.
|
[9] |
autodafe-fuzzer framework [EB/OL]. http://sourceforge.net/projects/autodafe/?source=directory[2015-1-31].
|
[10] |
BinNavi[EB/OL]. www.zynamics.com/binnavi.html, 2013.
|
[11] |
王金锭, 王嘉捷, 程绍银, 等. 基于统一中间表示的软件漏洞挖掘系统[C]// 第三届信息安全漏洞分析与风险评估大会. 合肥, 2010: 42-52.
|
[12] |
Alfred V A, Monica S L, Ravi S. 编译原理[M]. 第2版, 赵建华, 郑滔, 戴新宇译, 北京: 机械工业出版社, 2009.
|
[13] |
崔宝江, 梁晓兵, 王禹, 等. 基于回溯与引导的关键代码区域覆盖的二进制程序测试技术研究[J]. 电子与信息学报, 2012, 34(1): 108-114.Cui B J, Liang X B, Wang Y, et al. The study of binary program test techniques based on backtracking and leading for covering key code area[J]. Journal of Electronics &Information Technology, 2012, 34(1): 108-114.
|
[14] |
PEACH FUZZE[EB/OL]. http://peachfuzzer.com/, 2012.
|
[15] |
Chipounov V, Kuznetsov V, Candea G. S2E: A platform for in-vivo multi-path analysis of software systems[J]. ACM SIGARCH Computer Architecture News, 2011, 39(1): 265-278.)
|
[1] |
Goldfroid P, Klarund N. Sen K. DART: Directed automated random testing[C]// SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM Press, 2005: 213-223.
|
[2] |
Godefroid P, Levin M Y, Molnar D. Automated whitebox fuzz testing[C]// Proceedings of Network Distributed Security Symposium. San Diego, USA: The Internet Society, 2008: 151-166.
|
[3] |
Brumley D, Hartwig C, Kang M G, et al. BitScope: Automatically dissecting malicious binaries[R] Technical report CMU-CS-07-133, Carnegie Mellon University, 2007.
|
[4] |
Pǎsǎreanu C S, Mehlitz P C, Bushnell D H, et al. Combining unit-level symbolic execution and system-level concrete execution for testing NASA software[C]// Proceedings of the 2008 International Symposium on Software Testing and Analysis. Seattle, USA: ACM Press, 2008: 15-26.
|
[5] |
Hu C J, Li Z J , Ma J X, et al. File parsing vulnerability detection with symbolic execution[C]// Sixth International Symposium on Theoretical Aspects of Software Engineering. Beijing, China: IEEE Press, 2012: 135-142.
|
[6] |
Wang X, Chen H G, Jia Z H, et al. Improving integer security for systems with KINT[C]// Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation. Berkeley, USA: USENIX-Association, 2012: 163-177.
|
[7] |
Chipounov V, GeorgescuV, Zamfir C, et al. Selective symbolic execution[C]// Proceedings of the 5th Workshop on Hot Topics in System Dependability. Lisbon, Portugal: ACM Press, 2009: 1-6.
|
[8] |
Siddiqui J H, Khurshid S. ParSym: Parallel symbolic execution[C]// 2nd International Conference on Software Technology and Engineering. San Juan, Puerto Rico: IEEE Press, 2010: 405-409.
|
[9] |
autodafe-fuzzer framework [EB/OL]. http://sourceforge.net/projects/autodafe/?source=directory[2015-1-31].
|
[10] |
BinNavi[EB/OL]. www.zynamics.com/binnavi.html, 2013.
|
[11] |
王金锭, 王嘉捷, 程绍银, 等. 基于统一中间表示的软件漏洞挖掘系统[C]// 第三届信息安全漏洞分析与风险评估大会. 合肥, 2010: 42-52.
|
[12] |
Alfred V A, Monica S L, Ravi S. 编译原理[M]. 第2版, 赵建华, 郑滔, 戴新宇译, 北京: 机械工业出版社, 2009.
|
[13] |
崔宝江, 梁晓兵, 王禹, 等. 基于回溯与引导的关键代码区域覆盖的二进制程序测试技术研究[J]. 电子与信息学报, 2012, 34(1): 108-114.Cui B J, Liang X B, Wang Y, et al. The study of binary program test techniques based on backtracking and leading for covering key code area[J]. Journal of Electronics &Information Technology, 2012, 34(1): 108-114.
|
[14] |
PEACH FUZZE[EB/OL]. http://peachfuzzer.com/, 2012.
|
[15] |
Chipounov V, Kuznetsov V, Candea G. S2E: A platform for in-vivo multi-path analysis of software systems[J]. ACM SIGARCH Computer Architecture News, 2011, 39(1): 265-278.)
|