[1] Calhoun P, Loughney J. Diameter Base Protocol[S]. RFC 3588, 2003. [2] 张友春, 魏 强, 刘增良, 等. 信息系统漏洞挖掘技术体系研究[J]. 通信学报, 2011, 32(2): 42-47. [3] 李伟明, 张爱芳, 刘建财, 等. 网络协议的自动化模糊测试漏洞挖掘方法[J]. 计算机学报, 2011, 24(2): 242-255. [4] Hsu Y. A Model-based Approach to Security Flaw Detection of Network Protocol Implementations[C]//Proc. of International Conference on Network Protocols. Orlando, Finland: IEEE Press, 2008. [5] Duchene F, Groz R. XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing[C]//Proc. of the 5th International Conference on Software Testing. Montreal, Canada: IEEE Press, 2012. [6] 吴志勇, 王红川. 遗传算法在多维Fuzzing技术中的应用[J]. 小型微型计算机系统, 2011, 32(5): 998-1004. [7] Ahmed M A, Hermadi I. GA-based Multiple Paths Test Data Generator[J]. Computers & Operations Research, 2008, 35(10): 3107-3124. [8] Sofokleous A A, Andreou A S. Automatic Evolutionary Test Data Generation for Dynamic Software Testing[J]. The Journal of Systems and Software, 2008, 81(11): 1883-1898. [9] Juuso A M, Rontti T. Securing Next Generation Networks by Fuzzing Protocol Implementations[C]//Proc. of Technical Symposium at ITU Telecom World. Oulu, Finland: IEEE Press, 2011. [10] Wang Daping. An XML-based Testing Strategy for Probing Security Vulnerabilities in the Diameter Protocol[J]. Bell Labs Technical Journal, 2007, 12(3): 79-93. [11] 3GPP. TS 29.228-2011 IP Multimedia Subsystem Cx and Dx Interfaces: Signaling Flows and Message Contents (Release10)[S]. 2011. [12] 3GPP. TR 23.820-2009 Study on IMS Restoration Procedures (Release 9)[S]. 2009. [13] 3GPP. TS 23. 380-2011 IMS Restoration Procedures (Release10)[S]. 2011. [14] 3GPP. TS 29.229-2011 Cx and Dx Interfaces Based on the Diameter Protocol(Release 11)[S]. 2011. 编辑 索书志 |