메뉴 건너뛰기




Volumn 24-28-October-2016, Issue , 2016, Pages 1690-1701

SFADiff: Automated evasion attacks and fingerprinting using black-box differential automata learning

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION PROGRAMS; COMPUTER SYSTEM FIREWALLS; COMPUTER VIRUSES; HTML; TESTING; WEB BROWSERS;

EID: 84995519560     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2976749.2978383     Document Type: Conference Paper
Times cited : (50)

References (32)
  • 1
    • 84995440856 scopus 로고    scopus 로고
    • Accessed on 08/10/2016
    • Peach fuzzer. http://www.peachfuzzer.com/. (Accessed on 08/10/2016).
    • Peach fuzzer1
  • 4
    • 0023453626 scopus 로고
    • Learning regular sets from queries and counterexamples
    • D. Angluin. Learning regular sets from queries and counterexamples. Information and computation, 75(2):87-106, 1987.
    • (1987) Information and Computation , vol.75 , Issue.2 , pp. 87-106
    • Angluin, D.1
  • 7
    • 84874183838 scopus 로고    scopus 로고
    • ∗: Symbolic learning of input-output specifications
    • ∗: Symbolic Learning of Input-Output Specifications. In POPL, 2013.
    • (2013) POPL
    • Botinćan, M.1    Babić, D.2
  • 9
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security Symposium (USENIX Security), 2007.
    • (2007) USENIX Security Symposium (USENIX Security)
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 12
    • 0017973244 scopus 로고
    • Testing software design modeled by finite-state machines
    • T. Chow. Testing software design modeled by finite-state machines. IEEE transactions on software engineering, (3): 178-187, 1978.
    • (1978) IEEE Transactions on Software Engineering , vol.3 , pp. 178-187
    • Chow, T.1
  • 14
    • 84894057794 scopus 로고    scopus 로고
    • Minimization of symbolic automata
    • ACM
    • L. D'Antoni and M. Veanes. Minimization of symbolic automata. In ACM SIGPLAN Notices, volume 49, pages 541-553. ACM, 2014.
    • (2014) ACM SIGPLAN Notices , vol.49 , pp. 541-553
    • D'Antoni, L.1    Veanes, M.2
  • 20
    • 70349276980 scopus 로고    scopus 로고
    • Privacy oracle: A system for finding application leaks with black box differential testing
    • J. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Kohno. Privacy oracle: a system for finding application leaks with black box differential testing. In CCS, 2008.
    • (2008) CCS
    • Jung, J.1    Sheth, A.2    Greenstein, B.3    Wetherall, D.4    Maganis, G.5    Kohno, T.6
  • 21
    • 85046561721 scopus 로고
    • Lower bounds for natural proof systems
    • D. Kozen. Lower bounds for natural proof systems. In FOCS, 1977.
    • (1977) FOCS
    • Kozen, D.1
  • 23
    • 4043152821 scopus 로고    scopus 로고
    • Differential testing for software
    • W. McKeeman. Differential testing for software. Digital Technical Journal, 10(1), 1998.
    • (1998) Digital Technical Journal , vol.10 , Issue.1
    • McKeeman, W.1
  • 32
    • 79959889388 scopus 로고    scopus 로고
    • Finding and understanding bugs in C compilers
    • X. Yang, Y. Chen, E. Eide, and J. Regehr. Finding and understanding bugs in C compilers. In PLDI, 2011.
    • (2011) PLDI
    • Yang, X.1    Chen, Y.2    Eide, E.3    Regehr, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.