[1] Takanen A,Demott J D,Miller C.Fuzzing for Software Security Testing and Quality Assurance[M].Norwood:Artech House on Demand,2008.22-32.
[2] Godefroid P,Levin M Y,Molnar D.Automated whitebox fuzz testing[A].Network & Distributed System Security Symposium[C].San Diego,California,USA:Internet Society,2008.151-166.
[3] Anand S,Godefroid P,Tillmann N.Demand-driven compositional symbolic execution[A].14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems[C].Berlin,German:Springer,2008.367-381.
[4] Saxena P,Poosankam P,Mccamant S,et al.Loop-extended symbolic execution on binary programs[A].Proceedings of the Eighteenth International Symposium on Software Testing and Analysis[C].New York,USA:ACM,2009.225-236.
[5] Godefroid P,Luchaup D.Automatic partial loop summarization in dynamic test generation[A].Proceedings of the 2011 International Symposium on Software Testing and Analysis[C].New York,USA:ACM,2011.23-33.
[6] Godefroid P,Nori A V,Rajamani S K,et al.Compositional may-must program analysis:unleashing the power of alternation[A].ACM Sigplan Notices[C].New York,USA:ACM,2010.43-56.
[7] Boonstoppel P,Cadar C,Engler D.RWset:Attacking path explosion in constraint-based test generation[A].Tools and Algorithms for the Construction and Analysis of Systems[C].Berlin,German:Springer and Heidelberg GmbH & Co K,2008.351-366.
[8] 陈平,韩浩,沈晓斌,等.基于动静态程序分析的整形漏洞检测工具[J].电子学报,2010,38(8):1741-1747. Chen Ping,Han Hao,Shen Xiao-bing,et al.Detecting integer bugs based on static and dynamic program analysis[J].Acta Electronica Sinica,2010,38(8):1741-1747.(in Chinese)
[9] Godefroid P,Klarlund N,Sen K.DART:directed automated random testing[A].ACM Sigplan Notices[C].New York,USA:ACM,2005.213-223.
[10] Sen K,Agha G.Cute and jCUTE:Concolic unit testing and explicit path model-checking tools[A].Computer Aided Verification[C].Berlin,German:Springer,2006.419-423.
[11] Pop S.The SSA Representation Framework:Semantics,Analyses and GCC Implementation[D].Paris:école des Mines de Paris,2006.
[12] Nethercote N,Seward J.Valgrind:a framework for heavyweight dynamic binary instrumentation[J].ACM Sigplan Notices,2007,42(6):89-100.
[13] Song D,Brumley D,Caballero J,et al.BitBlaze:A new approach to computer security via binary analysis[A].Proceedings of the 4th International Conference on Information Systems Security:Information Systems Security[C].Berlin,German:Springer,2008.1-25. |