期刊文献+

A New Fuzzing Technique for Software Vulnerability Mining Using Multi-dimension Inputs 被引量:4

A New Fuzzing Technique for Software Vulnerability Mining Using Multi-dimension Inputs
下载PDF
导出
出处 《通讯和计算机(中英文版)》 2011年第2期88-95,共8页 Journal of Communication and Computer
关键词 输入输出 技术 模糊化 挖掘 维度 软件 测试用例 目标函数 Fuzzing technique, software, vulnerability mining, GAMutator, FTSG, DXFuzzing.
  • 相关文献

参考文献13

  • 1B.P. Miller, L. Fredrikson, B. So, An empirical study of the reliability of UNIX utilities, Comm. of the ACM 33 (1990) 32.
  • 2P. Godefroid, M. Levin, D. Molnar, Automated whitebox fuzz testing, In NDSS, 2008.
  • 3P. Godefroid, P. Halleux, A.V. Nori, S.K. Rajamani, W. Schulte, N. Tillmann, Automating software testing using program analysis, IEEE Software (2008) 30-37.
  • 4D. Aitel, The Advantages of Block-Based Protocol Analysis for Security Testing, Immunity Inc., 2002.
  • 5T. Boutell, et al., PNG (Portable Network Graphics) Specification, Version 1.0, IETF Request for Comments 2083.
  • 6C. Luk. R. Cohn. R. Muth. et al.. Pin: Building customized program analysis tools with d) namic insY:rumentation, in: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI2005). 2007. DP. 190-200.
  • 7P.J. Schroeder. B. Korel, Black-box test reduction using l/O analysis, in: Proceedings of the International Symposium on Software and Analysis (ISSTA '00), Portland, Oregon, August 2000.
  • 8C.C. Michael, G. McGraw. M.A. Schatz. Generating software test data by evolution. IEEE Transactions on Software Engineering 27 (2001) 1085-2001.
  • 9P.M. Minn, Search-based software test data generation: a survey, Softw. Test. Verif. Reliab. 14 (2004) 105-156.
  • 10C.D. Grosso. G. Antoniol. M.D. Penta, P. Galinier, E.Merlo. lmproxing nctxork applications security: A new heuristic to gencrale stress lcsting data. In GECCO'05, 2005.

同被引文献23

引证文献4

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部