[1]Sutton M, Greene A, Amini P, et al. Fuzzing: Brute Force Vulnerability Discovery[M]. Beijing: Publishing House of Electronics Industry, 2013: 1722[2]Bhme M, Pham V T, Roychoudhury A. Coveragebased greybox fuzzing as Markov chain[J]. IEEE Trans on Software Engineering, 2017, 45(5): 489506[3]Bhme M, Pham V T, Nguyen M D, et al. Directed greybox fuzzing[C] Proc of the 2017 ACM SIGSAC Conf on Computer and Communications Security. New York: ACM, 2017: 23292344[4]Lemieux C, Sen K. FairFuzz: A targeted mutation strategy for increasing greybox fuzz testing coverage[C] Proc of the 33rd ACMIEEE Int Conf on Automated Software Engineering. New York: ACM, 2018: 475485[5]Gan S, Zhang C, Qin X, et al. CollAFL: Path sensitive fuzzing[C] Proc of the 2018 IEEE Symp on Security and Privacy (SP). Piscataway, NJ: IEEE, 2018: 679696[6]Yue T, Wang P, Tang Y, et al. EcoFuzz: Adaptive energysaving greybox fuzzing as a variant of the adversarial multiarmed bandit[C] Proc of the 29th USENIX Conf on Security Symp. Berkeley, CA: USENIX Association, 2020: 23072324[7]Wang J, Chen B, Wei L, et al. Superion: Grammaraware greybox fuzzing[J]. arXiv preprint, arXiv:1812.01197, 2019[8]Li Y, Ji S, Lyu C, et al. VFuzz: Vulnerability predictionassisted evolutionary fuzzing for binary programs[J]. IEEE Trans on Cybernetics, 2022, 52(5): 37453756[9]Nagy S, Hicks M. Fullspeed fuzzing: Reducing fuzzing overhead through coverageguided tracing[J]. arXiv preprint, arXiv:1812.11875, 2019[10]Zhou X, Wang P, Liu C, et al. UltraFuzz: Towards resourcesaving in distributed fuzzing[J]. IEEE Trans on Software Engineering, 2023, 49(4): 23942412[11]Stephens N, Grosen J, Salls C, et al. Driller: Augmenting fuzzing through selective symbolic execution[C] Proc of the 2016 Network and Distributed System Security Symposium. San Francisco, USA: NDSS, 2016: 116[12]Zhao L, Cao P, Duan Y, et al. Probabilistic path prioritization for hybrid fuzzing[J]. IEEE Trans on Dependable and Secure Computing, 2022, 19(3): 19551973[13]Chen Y L, Jiang Y, Ma F C, et al. EnFuzz: Ensemble fuzzing with seed synchronization among diverse fuzzers[C] Proc of the 28th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2019: 19671983[14]Schumilo S, Aschermann C, Gawlik R, et al. kAFL: Hrdwareassisted feedback fuzzing for OS kernels[C] Proc of the 26th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2017: 167182[15]Natella R. StateAFL: Greybox fuzzing for stateful network servers[J]. arXiv preprint, arXiv:2110.06253, 2021[16]Du X, Chen A, He B, et al. AflIot: Fuzzing on linuxbased IoT device with binarylevel instrumentation[J]. Computers & Security, 2022, 122: 102889102991[17]Odena A, Goodfellow I. TensorFuzz: debugging neural networks with coverageguided fuzzing[J]. arXiv preprint, arXiv:1807.10875, 2018[18]Ko Y, Zhu B, Kim J. Fuzzing with automatically controlled interleavings to detect concurrency bugs[J]. Journal of Systems and Software, 2022, 191: 111379111394[19]Xu W, Moom H, Kashyap S, et al. Fuzzing file systems via twodimensional input space exploration[C] Proc of the 2019 IEEE Symposium on Security and Privacy (SP). Piscataway, NJ: IEEE, 2019: 117
|