1 |
|
2 |
|
|
|
3 |
MILLER B P, FREDRIKSEN L, SO B. An empirical study of the reliability of UNIX utilities. Communications of the ACM, 1990, 33 (12): 32- 44.
doi: 10.1145/96267.96279
|
4 |
MANÈS V J M, HAN H, HAN C, et al. The art, science, and engineering of fuzzing: a survey. IEEE Transactions on Software Engineering, 2021, 47 (11): 2312- 2331.
doi: 10.1109/TSE.2019.2946563
|
5 |
GODEFROID P. Fuzzing. Communications of the ACM, 2020, 63 (2): 70- 76.
doi: 10.1145/3363824
|
6 |
BOEHME M, CADAR C, ROYCHOUDHURY A. Fuzzing: challenges and reflections. IEEE Software, 2020, 38 (3): 79- 86.
|
7 |
|
8 |
PHAM V T, BÖHME M, ROYCHOUDHURY A. AFLNET: a grey-box fuzzer for network protocols[C]//Proceedings of the 13th IEEE International Conference on Software Testing, Validation and Verification. Washington D. C., USA: IEEE Press, 2020: 460-465.
|
9 |
SUTTON M, GREENE A, AMINI P. Fuzzing: brute force vulnerability discovery[M]. [S. 1. ]: Addison-Wesley, 2007.
|
10 |
|
11 |
BANKS G, COVA M, FELMETSGER V, et al. SNOOZE: toward a stateful NetwOrk prOtocol fuzZEr. Berlin, Germany: Springer, 2006.
|
12 |
KAKSONEN R, LAAKSO M, TAKANEN A. Software security assessment through specification mutations and fault injection. Berlin, Germany: Springer, 2001.
|
13 |
|
14 |
NATELLA R. StateAFL: grey-box fuzzing for stateful network servers. Empirical Software Engineering, 2022, 27 (7): 191.
doi: 10.1007/s10664-022-10233-3
|
15 |
SONG C X, YU B, ZHOU X, et al. SPFuzz: a hierarchical scheduling framework for stateful network protocol fuzzing. IEEE Access, 2019, 7, 18490- 18499.
doi: 10.1109/ACCESS.2019.2895025
|
16 |
|
17 |
LIU D G, PHAM V T, ERNST G, et al. State selection algorithms and their impact on the performance of stateful network protocol fuzzing[C]//Proceedings of IEEE International Conference on Software Analysis, Evolution and Reengineering. Washington D. C., USA: IEEE Press, 2022: 720-730.
|
18 |
WONDRACEK G, COMPARETTI P M, KRÜGEL C, et al. Automatic network protocol analysis[C]//Proceedings of NDSSʼ08. Washington D. C., USA: IEEE Press, 2008: 235-247.
|
19 |
COMPARETTI P M, WONDRACEK G, KRUEGEL C, et al. Prospex: protocol specification extraction[C]//Proceedings of the 30th IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2009: 110-125.
|
20 |
LIN Z, ZHANG X, XU D. Automatic reverse engineering of data structures from binary execution[C]//Proceedings of the 11th Annual Information Security Symposium. Washington D. C., USA: IEEE Press, 2010: 105-117.
|
21 |
BEDDOE M A. Network protocol analysis using bioinformatics algorithms. Toorcon, 2004, 26 (6): 1095- 1098.
|
22 |
FENG D F, DOOLITTLE R F. Progressive sequence alignment as a prerequisitetto correct phylogenetic trees. Journal of Molecular Evolution, 1987, 25 (4): 351- 360.
doi: 10.1007/BF02603120
|
23 |
|
24 |
CABALLERO J, YIN H, LIANG Z K, et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2007: 317-329.
|
25 |
LIN Z Q, JIANG X X, XU D Y, et al. Automatic protocol format reverse engineering through context-aware monitored execution[C]//Proceedings of NDSSʼ08. Washington D. C., USA: IEEE Press, 2008: 1-15.
|
26 |
LEITA C, MERMOUD K, DACIER M. ScriptGen: an automated script generation tool for Honeyd[C]//Proceedings of the 21st Annual Computer Security Applications Conference. Washington D. C., USA: IEEE Press, 2006: 203-214.
|
27 |
BOSSERT G, GUIHÉRY F, HIET G. Towards automated protocol reverse engineering using semantic information[C]//Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security. New York, USA: ACM Press, 2014: 51-62.
|
28 |
李伟明, 张爱芳, 刘建财, 等. 网络协议的自动化模糊测试漏洞挖掘方法. 计算机学报, 2011, 34 (2): 242- 255.
URL
|
|
LI W M, ZHANG A F, LIU J C, et al. An automatic network protocol fuzz testing and vulnerability discovering method. Chinese Journal of Computers, 2011, 34 (2): 242- 255.
URL
|
29 |
PHILLIPS P J, MARTIN A, WILSON C L, et al. An introduction evaluating biometric systems. Computer, 2000, 33 (2): 56- 63.
doi: 10.1109/2.820040
|
30 |
CUI W D, PAXSON V, WEAVER N, et al. Protocol-independent adaptive replay of application dialog[C]//Proceedings of NDSSʼ08. Washington D. C., USA: IEEE Press, 2008: 235-246.
|