[1] |
张雄, 李舟军. 模糊测试技术研究综述[J]. 计算机科学, 2016, 43(5):1-8,26.
doi: 10.11896/j.issn.1002-137X.2016.05.001
|
|
Zhang Xiong, Li Zhoujun. Survey of fuzz testing technology[J]. Computer Science, 2016, 43(5):1-8,26.
doi: 10.11896/j.issn.1002-137X.2016.05.001
|
[2] |
刘剑, 苏璞睿, 杨珉, 等. 软件与网络安全研究综述[J]. 软件学报, 2018, 29(1):42-68.
|
|
Liu Jian, Su Purui, Yang Min, et al. Software and cyber security-A survey[J]. Journal of Software, 2018, 29(1):42-68.
|
[3] |
田甜, 巩敦卫. 并发程序变异测试研究综述[J]. 电子学报, 2020, 48(11):2267-2277.
doi: 10.3969/j.issn.0372-2112.2020.11.025
|
|
Tian Tian, Gong Dunwei. Survey on mutation testing of concureent programs[J]. Acta Electronica Sinica, 2020, 48(11):2267-2277.
|
[4] |
Stephens N, Grosen J, Salls C, et al. Driller:Augmenting fuzzing through selective symbolic execution[C]. San Diego:Network and Distributed System Security Symposium, 2016:1-16.
|
[5] |
Yun I, Lee S, Xu M, et al. QSYM:A practical concolic execution engine tailored for hybrid fuzzing[C]. Baltimore:The Twenty-seventh USENIX Security Symposium, 2018:745-761.
|
[6] |
Wang X, Sun J, Chen Z, et al. Towards optimal concolic testing[C]. Gothenburg:Proceedings of the Fortyth International Conference on Software Engineering, 2018:291-302.
|
[7] |
Zalewski M. American fuzzy lop[EB/OL].(2021-06-08) [2023-04-05]http://lcamtuf.coredump.cx/afl.
|
[8] |
Gan S, Zhang C, Qin X, et al. Collafl:Path sensitive fuzzing[C]. San Francisco:IEEE Symposium on Security and Privacy, 2018:679-696.
|
[9] |
Böhme M, Pham V T, Roychoudhury A. Coverage-based greybox fuzzing as markov chain[J]. IEEE Transactions on Software Engineering, 2017, 45(5):489-506.
|
[10] |
Lemieux C, Sen K. Fairfuzz:A targeted mutation strategy for increasing greybox fuzz testing coverage[C]. Montpellier:Proceedings of the Thirty-third ACM/IEEE International Conference on Automated Software Engineering, 2018:475-485.
|
[11] |
Yue T, Wang P, Tang Y, et al. Ecofuzz:Adaptive energy-saving greybox fuzzing as a variant of the adversarial multi-armed bandit[C]. Berkeley:The Twenty-ninth USENIX Conference on Security Symposium, 2020:2307-2324.
|
[12] |
Zhang G, Wang P, Yue T, et al. Mobfuzz:Adaptive multi-objective optimization in gray-box fuzzing[C]. San Diego:Network and Distributed Systems Security Symposium, 2022:1145-1167.
|
[13] |
谢肖飞, 李晓红, 陈翔, 等. 基于符号执行与模糊测试的混合测试方法[J]. 软件学报, 2019, 30(10):3071-89.
|
|
Xie Xiaofei, Li Xiaohong, Chen Xiang, et al. Hybrid testing based on symbolic execution and fuzzing[J]. Journal of Software, 2019, 30(10):3071-3089.
|
[14] |
Zhang B, Ye J, Feng C, et al. S2:Discover hard-to-reach vulnerabilities by semi-symbolic fuzz testing[C]. Hong Kong:The Thirteenth International Conference on Computational Intelligence and Security, 2017:548-552.
|
[15] |
Huang H, Yao P, Wu R, et al. Pangolin:Incremental hybrid fuzzing with polyhedral path abstraction[C]. San Francisco:IEEE Symposium on Security and Privacy, 2020:1613-1627.
|
[16] |
Österlund S, Razavi K, Bos H, et al. ParmeSan:Sanitizer-guided greybox fuzzing[C]. Berkeley:The Twenty-ninth USENIX Conference on Security Symposium, 2020:2289-2306.
|
[17] |
Noirot M. FLVMeta-FLV metadata editor[EB/OL].(2021-08-19) [2023-04-05]https://github.com/noirotm/flvmeta.
|
[18] |
GNU. Cflow git[EB/OL].(2019-02-23) [2023-04-05]https://git.savannah.gnu.org/cgit/cflow.git.
|
[19] |
Commander D R. Ibjpeg-turbo[EB/OL].(2015-07-29) [2023-04-05]https://github.com/libjpeg-turbo/libjpeg-turbo.
|
[20] |
Dickey T. Index of/archives/ncurses/current[EB/OL].(2023-01-07) [2023-04-05]http://invisible-mirror.net/archives/ncurses/current.
|
[21] |
Andersson T. Mujsan embeddable javascript interpreter in C[EB/OL].(2020-07-08) [2023-04-05]https://github.com/ccxvii/mujs.
|
[22] |
GNU. Gdb and binutils[EB/OL].(2022-08-27) [2023-04-05]https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git.
|