[1] |
Wu Shizhong,Guo Tao,Dong Guowei,et al.Software vulnerability analysis techniques[M].Beijing:Science,2014.(in Chinese)
|
[2] |
Wang Tielei. Research on binaryexecutableoriented software vulnerability detection[D].Beijing:Peking University,2011.(in Chinese)
|
[3] |
Cadar C,Godefroid P,Khurshid S,et al.Symbolic execution for software testing in practice:Preliminary assessment[C]∥Proc of the 33rd International Conference on Software Engineering,2011:10661071.
|
[4] |
Avgerinos T,Rebert A,Cha S K,et al.Enhancing symbolic execution with veritesting[C]∥Proc of the 36th International Conference on Software Engineering,2014:10831094.
|
[5] |
Sutton M,Greene A,Amini P.Fuzzing:Brute force vulnerability discovery[M].Upper Saddle River:AddisonWesley Professional Press,2007.
|
[6] |
Takanen A.Fuzzing:The past,the present and the future[C]∥Actes du 7ème Symposium Sur la Sécurité des Technologies de I’information et des Communications (SSTIC),2009:202212.
|
[7] |
Pak B S.Hybrid fuzz testing:Discovering software bugs via fuzzing and symbolic execution[D].Pittsburgh:Carnegie Mellon University,2012.
|
[8] |
Newsome J,Song D.Dynamic taint analysis for automatic detection,analysis,and signature generation of exploits on commodity software[EB/OL].[20150709].http:∥repository.cmu.edu/cgi/viewcontent.cgi?article=1042&context=ece.
|
[9] |
Kang M G,McCamant S,Poosankam P,et al.DTA++:Dynamic taint analysis with targeted controlflow propagation[C]∥Proc of the 18th Annual Network & Distributed System Security Symposium (NDSS),2011:1.
|
[10] |
Kemerlis V P, Portokalidis G, Jee K, et al.libdft:Practical dynamic data flow tracking for commodity systems[J].Acm Sigplan Notices,2012,47(7):121132.
|
[11] |
Godefroid P,Klarlund N,Sen K.DART:Directed automated random testing[J]. Acm Sigplan Notices,2005,40(6):213223.
|
[12] |
Cadar C,Dunbar D,Engler D R.KLEE:Unassisted and automatic generation of highcoverage tests for complex systems programs[C]∥Proc of the 8th USENIX Symposium on Operating Systems Design and Implementation,2008:209224.
|
[13] |
Sogeti ESEC Lab.Fuzzgrind[EB/OL].[20150709].http:∥eseclab.sogeti.com/pages/fuzzgrind.html.
|
[14] |
Martignoni L,McCamant S,Poosankam P,et al.Pathexploration lifting:Hifi tests for lofi emulators[J]. Computer Architecture News,2012,40(1):337348.
|
[15] |
ArmourBrown C,Borntraeger C,Fitzhardinge J,et al.Valgrind[EB/OL].[20150709].http:∥valgrind.org/.
|
[16] |
Erdelyi G. IDAPython[EB/OL].[20150709].http:∥code.google.com/p/idapython/.
|
|
附中文参考文献:
|
[1] |
吴世忠,郭涛,董国伟,等.软件漏洞分析技术[M].北京:科学出版社,2014.
|
[2] |
王铁磊.面向二进制程序的漏洞挖掘关键技术研究[D].北京:北京大学,2011.
|