메뉴 건너뛰기




Volumn , Issue , 2009, Pages 474-484

Taint-based directed whitebox fuzzing

Author keywords

[No Author keywords available]

Indexed keywords

INPUT FILES; LARGE PROGRAMS; OPEN-SOURCE; PROGRAM ATTACKS; SYNTACTIC STRUCTURE; TEST FILES; TEST INPUTS; TESTING PROGRAMS; WHITE BOX;

EID: 77949898398     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2009.5070546     Document Type: Conference Paper
Times cited : (316)

References (24)
  • 2
    • 77949877700 scopus 로고    scopus 로고
    • Gnome and freedesktop enviroments. http: //en.wikipedia.org/wiki/ Freedesktop.org.
    • Gnome and freedesktop
  • 3
    • 77949879845 scopus 로고    scopus 로고
    • Wikipedia entry on fuzzing
    • Wikipedia entry on fuzzing. http://en.wikipedia.org/wiki/Fuzz-testing.
  • 5
    • 47249130414 scopus 로고    scopus 로고
    • Rwset: Attacking path explosion in constraint-based test generation
    • P. Boonstoppel, C. Cadar, and D. R. Engler. Rwset: Attacking path explosion in constraint-based test generation. In TACAS, pages 351-366, 2008.
    • (2008) TACAS , pp. 351-366
    • Boonstoppel, P.1    Cadar, C.2    Engler, D.R.3
  • 9
    • 67650067282 scopus 로고    scopus 로고
    • Grammar-based whitebox fuzzing
    • P. Godefroid, A. Kiezun, and M. Y. Levin. Grammar-based whitebox fuzzing. In PLDI, pages 206-215, 2008.
    • (2008) PLDI , pp. 206-215
    • Godefroid, P.1    Kiezun, A.2    Levin, M.Y.3
  • 12
    • 33847125360 scopus 로고    scopus 로고
    • A functional method for assessing protocol implementation security
    • Technical Report 448, VTT Electronics, 2001
    • R. Kaksonen. A functional method for assessing protocol implementation security. Technical Report 448, VTT Electronics, 2001.
    • Kaksonen, R.1
  • 14
    • 52649153312 scopus 로고    scopus 로고
    • Coverage maximization using dynamic taint tracing
    • Technical Report TR-1112, MIT Lincoln Laboratory
    • T. Leek, G. Baker, R. Brown, M. Zhivich, and R. Lippmann. Coverage maximization using dynamic taint tracing. Technical Report TR-1112, MIT Lincoln Laboratory, 2007.
    • (2007)
    • Leek, T.1    Baker, G.2    Brown, R.3    Zhivich, M.4    Lippmann, R.5
  • 17
    • 0025557712 scopus 로고
    • An empirical study of the reliability of unix utilities
    • B. P. Miller, L. Fredriksen, and B. So. An empirical study of the reliability of unix utilities. Commun. ACM, 33(12):32-44, 1990.
    • (1990) Commun. ACM , vol.33 , Issue.12 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 18
    • 77949876745 scopus 로고    scopus 로고
    • D. Molnar and D. Wagner. Catchconv: Symbolic execution and run-time type inference for integer conversion errors. Technical Report UCB/EECS-2007-23, University of California, Berkeley, CA, Feb 2007.
    • D. Molnar and D. Wagner. Catchconv: Symbolic execution and run-time type inference for integer conversion errors. Technical Report UCB/EECS-2007-23, University of California, Berkeley, CA, Feb 2007.
  • 19
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on comnodity software
    • J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on comnodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.2
  • 22
    • 32344447459 scopus 로고    scopus 로고
    • Cute: A concolic unit testing engine for c
    • K. Sen, D. Marinov, and G. Agha. Cute: a concolic unit testing engine for c. SIGSOFT Softw. Eng. Notes, 30(5):263-272, 2005.
    • (2005) SIGSOFT Softw. Eng. Notes , vol.30 , Issue.5 , pp. 263-272
    • Sen, K.1    Marinov, D.2    Agha, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.