[1]Li J, Zhao B, Zhang C. Fuzzing: A survey[J]. Cybersecurity, 2018, 1: 113[2]Zhao B, Li Z, Qin S, et al.StateFuzz: System callbased stateaware linux driver fuzzing[C] Proc of the 31st USENIX Security Symposium. Berkeley, CA: USENIX Association, 2022: 32733289[3]Bellard F. QEMU, a fast and portable dynamic translator[C] Proc of the USENIX Annual Technical Conference, FREENIX Track. Berkeley, CA: USENIX Association, 2005: 4146[4]Kivity A, Kamay Y, Laor D. KVM: The Linux virtual machine monitor[C] Proc of the Linux Symposium. Ottawa: Linux Symposium Organization, 2007: 225230[5]Lemieux C, Sen K.Fairfuzz: A targeted mutation strategy for increasing greyboxfuzz testing coverage[C]Proc of the 33rd ACMIEEE Int Confe on Automated Software Engineering. New York: ACM, 2018: 475485[6]Fioraldi A, Maier D, Eifeldt H. AFL++: Combining incremental steps of fuzzing research[C] Proc of the 14th USENIX Workshop on Offensive Technologies (WOOT 20). Berkeley, CA: USENIX Association, 2020: 112[7]Vyukov D. Syzkaller: An unsupervised coverageguided kernel fuzzer[CPOL]. 2016[20241219]. https:github.comgooglesyzkaller[8]Schumilo S, Aschermann C, Gawlik R. kAFL: Hardwareassisted feedback fuzzing for OS kernels[C] Proc of the 26th USENIX Security Symposium. Berkeley, CA: USENIX Association, 2017: 167182[9]Kim K, Jeong D R, Kim C H, et al. HFL: Hybrid fuzzing on the Linux kernel[C] Proc of the 27th Annual Network and Distributed System Security Symposium. San Diego: The Internet Society, 2020: 117[10]Busch M, Machiry A, Spensky C, et al. Teezz: Fuzzing trusted applications on cots android devices[C] Proc of the 2023 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2023: 12041219[11]Wang Q, Chang B, Ji S, et al. Syztrust: Stateaware fuzzing on trusted os designed for iot devices[C] Proc of the 2024 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2024: 23102387[12]Song J, Jo E, Kim J. DTA: RunTrustZone TAs outside the secure world for security testing[J]. IEEE Access, 2024, 12: 1671516727[13]Ghaniyoun M, Barber K, Xiao Y, et al. TEESec: Presilicon vulnerability discovery for trusted execution environments[C] Proc of the 50th Annual Int Symp on Computer Architecture. New York: ACM, 2023: 115[14]Pham V T, Bhme M, Roychoudhury A. Aflnet: A greybox fuzzer for network protocols[C] Proc of the 13th IEEE Int Conf on Software Testing, Validation and Verification. Piscataway, NJ: IEEE, 2020: 460465[15]Natella R. Stateafl: Greybox fuzzing for stateful network servers[J]. Empirical Software Engineering, 2022, 27(7): 112[16]Wang S, Chollak D, MovshovitzAttias D, et al. Bugram: Bug detection with NGram language models[C] Proc of the 31st IEEEACM Int Conf on Automated Software Engineering. New York: ACM, 2016: 708719[17]Google. Fuchsia: An open source operating system[EBOL]. [20241219]. https:fuchsia.dev[18]Li D, Chen H. FastSyzkaller: Improving fuzz efficiency for linux kernel fuzzing[C] Proc of the Journal of Physics: Conference Series. Bristol: IOP Publishing, 2019
|