[1]
Zhi-yong Wu, J. William Atwood, Xue-yong Zhu. A new Fuzzing technique for software vulnerability mining[A]. In Proceedings of IEEE CONSEG'09[C]. pp.59-66, December (2009).
Google Scholar
[2]
Xueyong Zhu, Zhiyong Wu, and J. William Atwood, A New Fuzzing Method Using Multi Data Samples Combination, Journal of Computers, Volume 6, Number 5, p.881—888, ISSN 1796-203X, © 2011 ACADEMY PUBLISHER, May (2011).
DOI: 10.4304/jcp.6.5.881-888
Google Scholar
[3]
Vijay Ganesh, Tim Leek, Martin Rinard. Taint-based Directed Whitebox Fuzzing[A] In Proceedings of IEEE ICSE'09[C], 978-1-4244-3452-7/09, May, (2009).
DOI: 10.1109/icse.2009.5070546
Google Scholar
[4]
Berndt D, Fisher J, Johnson L, Pinglikar J, Watkins A. Breeding software test cases with genetic algorithms[A]. In Proceedings of the Hawai international conference on system sciences[C]. p.338–48, (2003).
DOI: 10.1109/hicss.2003.1174917
Google Scholar
[5]
Sherri Sparks, Ryan Cunningham, Shawn Embleton, Cliff C. Zou. Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting[A], in 23rd Annual Computer Security Applications Conference (ACSAC)[C], pp.477-486, Dec (2007).
DOI: 10.1109/acsac.2007.27
Google Scholar
[6]
LIU Guang-Hong, WU Gang, ZHENG Tao, SHUAI Jian-Mei, TANG Zhuo-Chun, Vulnerability analysis for x86 executables using genetic algorithm and fuzzing[A]. In Proceedings of International Conference on Convergence Hybird Information Technique (ICCIT)[C], 2008. 9.
DOI: 10.1109/iccit.2008.9
Google Scholar
[7]
Del Grosso C, Di Penta M, Antoniol G, Merlo E, Galinier P. Improving network applications security: a new heuristic to generate stress testing data[A]. In: Proceedings of the genetic and evolutionary computation conference[C], pp.1037-1043, (2005).
DOI: 10.1145/1068009.1068185
Google Scholar
[8]
Del Grosso C, Di Penta M, Antoniol G, Merlo E, Galinier P. Detecting buffer overflow via automatic test input data generation[J]. Computers and Operations Research, v. 35 n. 10, pp.3125-3143, October (2008).
DOI: 10.1016/j.cor.2007.01.013
Google Scholar
[9]
Ren Hua, Detecting Buffer Overflow in Binary Code by Analyzing Unsafe Functions [D]. Master thesis of PLA Information Engineering University, (2007).
Google Scholar
[10]
Li, X. D. Adaptively Choosing Neighbourhood Bests Using Species in a Particle Swarm Optimizer for Multimodal Functions Optimization[A]. In Proceedings of Genetic and Evolutionary Comptiation [C], Springer Berlin/Heidelberg, (2004).
DOI: 10.1007/978-3-540-24854-5_10
Google Scholar
[11]
Li, J. P., M. E. Balazs, G. Parks, and P.J. Clarkson, A Species Conserving Genetic Algorithm for Multimodal Function Optimization[J]. Evolutionary Computation, 10(3), pp.207-234, (2002).
DOI: 10.1162/106365602760234081
Google Scholar
[12]
De Jong, K. A., An Analysis of the Behavior of a Class of Genetic Adaptive Systems[R], in Department of Computer Science, University of Michigan: Ann Arbor, Michigan, USA, (1975).
Google Scholar