[1] |
吴世忠,郭涛,董国伟,等. 软件漏洞分析技术[M]. 北京:科学出版社,2014.
|
[2] |
诸葛建伟,陈力波,田繁,等. 基于类型的动态污点分析[J]. 清华大学学报:自然科学版,2012,52(10):1320-1321.
|
[3] |
王铁磊. 面向二进制程序的漏洞挖掘关键技术研究[D]. 北京:北京大学,2011.
|
[4] |
姜玲燕,梁阿磊,管海兵. 动态二进制翻译中的中间表示[J]. 计算机工程,2009,35(9):283-285.
|
[5] |
SONG D, BRUMLEY D, YIN Heng, et al.BitBlaze: A New Approach to Computer Security via Binary Analysis[C]//Springer. 4th International Conference on Information Systems Security, December 16-20, 2008, Hyderabad, India. Berlin: Heidelberg, 2008: 1-25.
|
[6] |
SHOSHITAISHVILI Y, WANG Ruoyu, SALLS C, et al.The Art of War: Offensive Techniques in Binary Analysis[C]//IEEE. 2016 IEEE Symposium on Security and Privacy, May 22-26, 2016, San Jose, CA, USA. New Jersey: IEEE, 2016: 138-157.
|
[7] |
陈凯明,刘宗田. 符号执行过程的DFA和CFA[J]. 计算机工程,2002,28(11):95-96.
|
[8] |
CIFUENTES C, EMMERIK V M.UQBT: Adaptable Binary Translation at Low Cost[J]. Computer, 2000, 33(3): 60-66.
|
[9] |
BRUSCHI D, MARTIGNONI L, MONGA M. Boomerang[EB/OL]. , 2017-2-11.
|
[10] |
马金鑫,李舟军,忽朝俭,等. 一种重构二进制代码中类型抽象的方法[J]. 计算机研究与发展,2013,50(11):2418-2428.
|
[11] |
NETHERCOTE N, SEWARD J.Valgrind: a Framework for Heavyweight Dynamic Binary Instrumentation[J]. ACM Sigplan Notices, 2007, 42(6): 89-100.
|
[12] |
DENNING D E.A Lattice Model of Secure Information Flow[J]. Communications of the ACM, 1976, 19(5): 236-243.
|
[13] |
黄强,曾庆凯. 基于信息流策略的污点分析传播分析及动态验证[J]. 软件学报,2011,22(9):2036-2048.
|
[14] |
史大伟,袁天伟. 一种粗细粒度结合的动态污点分析方法[J]. 计算机工程,2014,40(3):12-17.
|
[15] |
代伟,刘智,刘益和. 基于二进制代码的动态污点分析[J]. 计算机应用与研究,2014,31(8):2497-2505.
|
[16] |
YIN Heng, SONG D. Temu: Binary Code Analysis via Whole-system Layered Annotative Execution[EB/OL]. , 2016-6-11.
|
[17] |
KANG M G, MCCAMANT S, POOSANKAM P, et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation[EB/OL]. , 2011-2-6.
|
[18] |
马金鑫,李舟军,张涛,等. 基于执行踪迹离线索引的污点分析方法[EB/OL]. , 2017-2-20.
|
[19] |
王蕾,李丰,李炼,等. 污点分析技术的原理和实践应用[J]. 软件学报,2017,28(4):1-11.
|
[20] |
宋铮,王永剑,金波,等. 二进制程序动态污点分析技术研究综述[J]. 信息网络安全,2016(3):77-83.
|
[21] |
NEWSOME J, SONG D.Dynamic Taint Analysis for Automatic Detection, Analysis and Signature Generation of Exploits on Commodity Software[J] Chinese Journal of Engineering Mathematics, 2005, 29(5): 720-724.
|
[22] |
CLAUSE J, LI Wanchun, ORSO A.Dytan: A Generic Dynamic Taint Analysis Framework[C]//ACM. 2007 International Symposium on Software Testing and Analysis, July 9-12, 2007, London, United Kingdom. New York: ACM, 2007: 196-206.
|
[23] |
QIN Feng, WANG Cheng, LI Zhenmin, et al.Lift: A Low-overhead Practical Information Flow Tracking System for Detecting Security Attacks[C]//IEEE. 39th Annual IEEE/ACM International Symposium on Microarchitecture, Orlando, FL, USA, December 9-13, 2006. New Jersey: IEEE, 2006: 135-148.
|
[24] |
彭建山,奚琪,王清贤. 二进制程序整型溢出漏洞的自动验证方法[J]. 信息网络安全,2017(5):14-21.
|
[25] |
林伟,蔡瑞杰,祝跃飞,等. 基于语义规则的污点传播分析优化方法[J]. 计算机应用,2014,34(12):3511-3514.
|
[26] |
朱正欣,曾凡平,黄心依. 二进制程序的动态符号化污点分析[J]. 计算机科学,2016,43(2):155-158.
|
[27] |
崔化良,兰芸,崔宝江. 动态污点分析技术在ActiveX 控件漏洞挖掘上的应用[J]. 信息网络安全,2013(12):16-19.
|
[28] |
MOLNAR D, LI Xuecong, WAGNER D.Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs[C]//ACM. 18th Conference on USENIX Security Symposium, August 10-14, 2009, Montreal, Canada. New York: ACM, 2009: 67-82.
|
[29] |
GODEFROID P, LEVIN M Y, MOLNAR D A. Automated Whitebox Fuzz Testing[EB/OL]. , 2017-2-12.
|
[30] |
陆萍萍. 二进制代码的漏洞挖掘技术研究[D]. 北京:北京理工大学,2013.
|
[31] |
BOYER R S, ELSPAS B, LEVITT K N.SELECT—A Formal System for Testing and Debugging Programs by Symbolic Execution[J]. ACM SigPlan Notices, 1975, 10(6): 234-245.
|
[32] |
BUSH W R, PINCUS J D, SIELAFF D J.A Static Analyzer for Finding Dynamic Programming Errors[J]. Software-Practice and Experience, 2000, 30(7): 775-802.
|
[33] |
SEN K, MARINOV D, AGHA G.CUTE: A Concolic Unit Testing Engine for C[J]. ACM Sigsoft Software Engineering Notes, 2005, 30(5): 263-272.
|
[34] |
GODEFROID P, KLARLUND N, SEN K. DART: Directed Automated Random Testing[EB/OL]. , 2017-2-11.
|
[35] |
CADAR C, DUNBAR D, ENGLER D R.KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs[C]//ACM. 8th USENIX Symposium on Operating Systems Design and Implementation, December 8-10, 2008, San Diego, California. New Jersey: 2008: 209-224.
|
[36] |
BOONSTOPPEL P, CADAR C, ENGLER D.RWset: Attacking Path Explosion in Constraint-based Test Generation[C]//Springer. 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, March 29-April 6, 2008, Budapest, Hungary. Berlin: Heidelberg, 2008: 351-366.
|
[37] |
李舟军,张俊贤,廖湘科,等. 软件安全漏洞检测技术[J]. 计算机学报,2015,38(4):717-728.
|
[38] |
MILLER B P, FREDRIKSEN L, SO B.An Empirical Study of the Reliability of UNIX Utilities[J]. Communications of the ACM, 1990, 33(12): 32-44.
|
[39] |
KAKSONEN R. A Functional Method for Assessing Protocol Implementation Security[EB/OL]. , 2017-2-15.
|
[40] |
AITEL D. An Introduction to SPIKE, the Fuzzer Creation Kit[EB/OL]. , 2017-2-15.
|
[41] |
EDDINGTON M. sPeach[EB/OL]. , 2017-2-10.
|
[42] |
AMINI P. Sulley[EB/OL]. , 2017-2-10.
|
[43] |
WANG Tielei, WEI Tao, GU Guofei, et al.TaintScope: A Checksum-aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection[C]//IEEE. 2010 IEEE symposium on Security and Privacy, May 16-19, 2010, Oakland, CA, USA. New Jersey: IEEE, 2010: 497-512.
|
[44] |
杜晓军,林柏钢,林志远,等. 安全软件模糊测试中多种群遗传算法的研究[J]. 山东大学学报:理学版,2013(7):79-84.
|
[45] |
史记,曾昭龙,杨从保,等. Fuzzing测试技术综述[J]. 信息网络安全,2014(3):87-91.
|
[46] |
王连赢. 文件触发类二进制程序漏洞挖掘技术研究[D]. 北京:北京邮电大学,2015.
|