A Target-Aware Symbolic Execution Framework for Fuzz Testing
碩士 === 國立交通大學 === 資訊科學與工程研究所 === 102 === Vulnerabilities caused by implementation bugs, such as buffer overflows, integer overflows, uncontrolled format strings, and command injections, are often exploited by hackers to intrude users’ personal computer or servers. In order to reduce software...
Main Authors: | Chung, Hsiang, 鍾翔 |
---|---|
Other Authors: | Huang, Shih-Kun |
Format: | Others |
Language: | en_US |
Published: |
2014
|
Online Access: | http://ndltd.ncl.edu.tw/handle/31944646331050969888 |
Similar Items
-
CSEFuzz: Fuzz Testing Based on Symbolic Execution
by: Zhangwei Xie, et al.
Published: (2020-01-01) -
Fuzz Testing on Android APPs by Selective Symbolic Execution
by: Khor, Kee Kiat, et al.
Published: (2012) -
Scheduling Fuzz Testing with Symbolic Mutation
by: Luo, Shao-Wen, et al.
Published: (2015) -
Hermes: A Targeted Fuzz Testing Framework
by: Shortt, Caleb James
Published: (2015) -
Combining dynamic symbolic execution, code static analysis and fuzzing
by: A. Yu. Gerasimov, et al.
Published: (2019-02-01)