1]李红辉, 齐佳, 刘峰, 等. 模糊测试技术研究[J]. 中国科学: 信息科学, 2014, 44(10): 13051322[2]Google Inc. Chrome reward program[EBOL]. [20160530]. https:www.google.comaboutappsecuritychromerewards[3]Mozilla Corporation. Bug bounty program[EBOL]. [20160530]. https:www.mozilla.orgenUSsecuritybugbounty[4]Stephen Fewer. Grinder: Automate fuzzing system[EBOL]. [20160530]. https:github.comstephenfewergrinder[5]Krakow Lab. Bf3: Browser fuzzer 3[EBOL]. [20160530]. https:www.aldeid.comwikiBf3[6]Takanen A, Demott J D, Miller C. Fuzzing for Software Security Testing and Quality Assurance[M]. London: Artech House, 2008[7]Rawat S, Mounier L. Offsetaware mutation based fuzzing for buffer overflow vulnerabilities: Few preliminary results[C] Proc of the 4th IEEE Int Conf on Software Testing, Verification and Validation Workshops (ICSTW). Piscataway, NJ: IEEE, 2011: 531533[8]Godefroid P, Levin M Y, Molnar D. SAGE: whitebox fuzzing for security testing[J]. Queue, 2012, 10(3): 4044[9]Zalewski M. AFL: American fuzzy lop[EBOL]. [20160530]. http:lcamtuf.coredump.cxafl[10]Zalewski M. Cross fuzz[EBOL]. (20111124) [20160530]. http:lcamtuf.coredump.cxcross_fuzz[11]Bruening D, Garnett T, Bruening D, et al Tutorial: Building dynamic instrumentation tools with dynamorio[C] Proc of the 2013 IEEEACM Int Symp on Code Generation and Optimization (CGO). Piscataway, NJ: IEEE, 2008[12]Oulu University Secure Programming Group. Radamsa[EBOL].[20140629]. https:www.ee.oulu.firesearchouspgRadamsa.[13]Valotta R. Nduja fuzzer[EBOL]. (20130103)[20160530]. https:sites.google.comsitetentacoloviolafuzzingwithdomlevel2and3