AFLPro: Direction sensitive fuzzing
Tài liệu tham khảo
Tian, 2019, Real-time lateral movement detection based on evidence reasoning network for edge computing environment, IEEE Trans Ind Inf, 15, 4285, 10.1109/TII.2019.2907754
lcamtuf. american fuzzy lop. 2019. http://lcamtuf.coredump.cx/afl/.
Stephens, 2016, Driller: augmenting fuzzing through selective symbolic execution., 16, 1
Peng, 2018, T-fuzz: fuzzing by program transformation, 697
Wang, 2010, Taintscope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection, 497
Rawat, 2017, Vuzzer: application-aware evolutionary fuzzing., 17, 1
Zhang, 2019, Insfuzz: fuzzing binaries with location sensitivity, IEEE Access, 7, 22434, 10.1109/ACCESS.2019.2894178
Böhme, 2017, Coverage-based greybox fuzzing as markov chain, IEEE Trans Softw Eng
Hex-Rays. Idapython. 2019. https://www.hex-rays.com/products/ida/support/idapython_docs/.
Shoshitaishvili, 2016, Sok:(state of) the art of war: Offensive techniques in binary analysis, 138
vanhauser thc. american fuzzy lop plus. 2019. https://github.com/vanhauser-thc/AFLplusplus.
Jiang, 2018, An exploitability analysis technique for binary vulnerability based on automatic exception suppression, Secur Commun Netw, 2018, 10.1155/2018/4610320
Li, 2017, Steelix: program-state based binary fuzzing, 627
Dolan-Gavitt, 2016, Lava: Large-scale automated vulnerability addition, 110
Bellard, 2005, Qemu, a fast and portable dynamic translator., 41, 46
Paradyn. Dyninst api. 2019a. https://www.dyninst.org/dyninst.
Paradyn. dyninst. 2019b. https://github.com/dyninst/dyninst.
Klees, 2018, Evaluating fuzz testing, 2123
Böhme, 2017, Directed greybox fuzzing, 2329
Gan, 2018, Collafl: Path sensitive fuzzing, 679
Godefroid, 2005, Dart: directed automated random testing, 40, 213
Godefroid, 2008, Automated whitebox fuzz testing., 8, 151
Cha, 2015, Program-adaptive mutational fuzzing, 725
Chen, 2018, Hawkeye: towards a desired directed grey-box fuzzer, 2095
Kargén, 2015, Turning programs against each other: high coverage fuzz-testing using binary-code mutation and dynamic slicing, 782
lafintel. laf-intel: Circumventing fuzzing roadblocks with compiler transformations. 2019a. https://lafintel.wordpress.com/2016/08/15/circumventing-fuzzing-roadblocks-with-compiler-transformations/.
lafintel. Laf llvm passes. 2019b. https://gitlab.com/laf-intel/laf-llvm-pass/tree/master.
Xiao, 2007, A survey of key management schemes in wireless sensor networks, Comput Commun, 30, 2314, 10.1016/j.comcom.2007.04.009
Du, 2007, An effective key management scheme for heterogeneous sensor networks, Ad Hoc Netw, 5, 24, 10.1016/j.adhoc.2006.05.012
Du, 2008, Security in wireless sensor networks, IEEE Wireless Commun, 15, 60, 10.1109/MWC.2008.4599222
Du, 2011, Transactions papers a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks, IEEE Trans Wireless Commun, 02, 1223
Li, 2019, Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems, IEEE Internet Things J
Tian, 2019, A data-driven method for future internet route decision modeling, Future Generat Comput Syst, 95, 212, 10.1016/j.future.2018.12.054
Xiao, 2007, Internet protocol television (iptv): the killer application for the next-generation internet, IEEE Commun Mag, 45, 126, 10.1109/MCOM.2007.4378332
Tan, 2018, Towards a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet Things J
Tan, 2018, Toward a comprehensive insight into the eclipse attacks of tor hidden services, IEEE Internet Things J, 6, 1584, 10.1109/JIOT.2018.2846624
Tian, 2019, Evaluating reputation management schemes of internet of vehicles based on evolutionary game theory, arXiv preprint arXiv:190204667
Tian, 2019, Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet Things J
Qiu, 2020, Nei-tte: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Trans Ind Inf, 16, 2659, 10.1109/TII.2019.2943906
Qiu, 2020, A survey on access control in the age of internet of things, IEEE Internet Things J, 10.1109/JIOT.2020.2969326
Tian, 2019, A distributed deep learning system for web attack detection on edge devices, IEEE Trans Ind Inf, 16, 1963, 10.1109/TII.2019.2938778
Tian, 2019, Block-def: a secure digital evidence framework using blockchain, Inf Sci (Ny), 491, 151, 10.1016/j.ins.2019.04.011