메뉴 건너뛰기




Volumn , Issue , 2013, Pages 49-63

Dowsing for overflows: A guided fuzzer to find buffer boundary violations

Author keywords

[No Author keywords available]

Indexed keywords

BUFFER STORAGE; MODEL CHECKING;

EID: 84954469022     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (265)

References (45)
  • 13
    • 85076282614 scopus 로고    scopus 로고
    • The evolving art of fuzzng
    • DEMOTT, J. The evolving art of fuzzng. DEFCON 14, http://www.appliedsec.com/files/The_Evolving_Art_of_Fuzzing 2005.
    • (2005) DEFCON , vol.14
    • Demott, J.1
  • 25
    • 0025557712 scopus 로고
    • An empirical study of the reliability of UNIX utilities
    • Dec
    • MILLER, B. P., FREDRIKSEN, L., and SO, B. An empirical study of the reliability of UNIX utilities. Commun. ACM 33 (Dec 1990), 32-44.
    • (1990) Commun. ACM , vol.33 , pp. 32-44
    • Miller, B.P.1    Fredriksen, L.2    So, B.3
  • 31
    • 27544444280 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • NDSS'05
    • NEWSOME, J., and SONG, D. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Proceedings of the Network and Distributed Systems Security Symposium (2005), NDSS'05.
    • (2005) Proceedings of the Network and Distributed Systems Security Symposium
    • Newsome, J.1    Song, D.2
  • 39
    • 85076302358 scopus 로고    scopus 로고
    • SPIKE. http://www.immunitysec.com/resources-freesoftware.shtml.
    • SPIKE


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.