AFLPro: Direction sensitive fuzzing

Journal of Information Security and Applications - Tập 54 - Trang 102497 - 2020
Tiantian Ji1, Zhongru Wang1,2, Zhihong Tian3, Binxing Fang1,3, Qiang Ruan4, Haichen Wang5, Wei Shi6
1Key Laboratory of Trustworthy Distributed Computing and Service (BUPT), Ministry of Education, Beijing University of Posts and Telecommunications, Beijing, China
2Chinese Academy of Cyberspace Studies, Beijing, China
3Cyber space Institute of Advanced Technology, Guangzhou University, Guangzhou, China
4Beijing DigApis Technology Co., Ltd, Beijing, China
5Beijing University of Posts and Telecommunications, Beijing, China
6School of Information Technology, Carleton University, Ottawa, Canada

Tài liệu tham khảo

Tian, 2019, Real-time lateral movement detection based on evidence reasoning network for edge computing environment, IEEE Trans Ind Inf, 15, 4285, 10.1109/TII.2019.2907754 lcamtuf. american fuzzy lop. 2019. http://lcamtuf.coredump.cx/afl/. Stephens, 2016, Driller: augmenting fuzzing through selective symbolic execution., 16, 1 Peng, 2018, T-fuzz: fuzzing by program transformation, 697 Wang, 2010, Taintscope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection, 497 Rawat, 2017, Vuzzer: application-aware evolutionary fuzzing., 17, 1 Zhang, 2019, Insfuzz: fuzzing binaries with location sensitivity, IEEE Access, 7, 22434, 10.1109/ACCESS.2019.2894178 Böhme, 2017, Coverage-based greybox fuzzing as markov chain, IEEE Trans Softw Eng Hex-Rays. Idapython. 2019. https://www.hex-rays.com/products/ida/support/idapython_docs/. Shoshitaishvili, 2016, Sok:(state of) the art of war: Offensive techniques in binary analysis, 138 vanhauser thc. american fuzzy lop plus. 2019. https://github.com/vanhauser-thc/AFLplusplus. Jiang, 2018, An exploitability analysis technique for binary vulnerability based on automatic exception suppression, Secur Commun Netw, 2018, 10.1155/2018/4610320 Li, 2017, Steelix: program-state based binary fuzzing, 627 Dolan-Gavitt, 2016, Lava: Large-scale automated vulnerability addition, 110 Bellard, 2005, Qemu, a fast and portable dynamic translator., 41, 46 Paradyn. Dyninst api. 2019a. https://www.dyninst.org/dyninst. Paradyn. dyninst. 2019b. https://github.com/dyninst/dyninst. Klees, 2018, Evaluating fuzz testing, 2123 Böhme, 2017, Directed greybox fuzzing, 2329 Gan, 2018, Collafl: Path sensitive fuzzing, 679 Godefroid, 2005, Dart: directed automated random testing, 40, 213 Godefroid, 2008, Automated whitebox fuzz testing., 8, 151 Cha, 2015, Program-adaptive mutational fuzzing, 725 Chen, 2018, Hawkeye: towards a desired directed grey-box fuzzer, 2095 Kargén, 2015, Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing, 782 lafintel. laf-intel: Circumventing fuzzing roadblocks with compiler transformations. 2019a. https://lafintel.wordpress.com/2016/08/15/circumventing-fuzzing-roadblocks-with-compiler-transformations/. lafintel. Laf llvm passes. 2019b. https://gitlab.com/laf-intel/laf-llvm-pass/tree/master. Xiao, 2007, A survey of key management schemes in wireless sensor networks, Comput Commun, 30, 2314, 10.1016/j.comcom.2007.04.009 Du, 2007, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Netw, 5, 24, 10.1016/j.adhoc.2006.05.012 Du, 2008, Security in wireless sensor networks, IEEE Wireless Commun, 15, 60, 10.1109/MWC.2008.4599222 Du, 2011, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans Wireless Commun, 02, 1223 Li, 2019, Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems, IEEE Internet Things J Tian, 2019, A data-driven method for future internet route decision modeling, Future Generat Comput Syst, 95, 212, 10.1016/j.future.2018.12.054 Xiao, 2007, Internet protocol television (iptv): the killer application for the next-generation internet, IEEE Commun Mag, 45, 126, 10.1109/MCOM.2007.4378332 Tan, 2018, Towards a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet Things J Tan, 2018, Toward a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet Things J, 6, 1584, 10.1109/JIOT.2018.2846624 Tian, 2019, Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory, arXiv preprint arXiv:190204667 Tian, 2019, Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet Things J Qiu, 2020, Nei-tte: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Trans Ind Inf, 16, 2659, 10.1109/TII.2019.2943906 Qiu, 2020, A survey on access control in the age of internet of things, IEEE Internet Things J, 10.1109/JIOT.2020.2969326 Tian, 2019, A distributed deep learning system for web attack detection on edge devices, IEEE Trans Ind Inf, 16, 1963, 10.1109/TII.2019.2938778 Tian, 2019, Block-def: a secure digital evidence framework using blockchain, Inf Sci (Ny), 491, 151, 10.1016/j.ins.2019.04.011