共 87 条
- [1] Miller B P, Fredriksen L, So B., An empirical study of the reliability of UNIX utilities, Communications of the ACM, 33, 12, pp. 32-44, (1990)
- [2] Langner R., Stuxnet: Dissecting a cyberwarfare weapon, IEEE Security & Privacy, 9, 3, pp. 49-51, (2011)
- [3] Mohurle S, Patil M., A brief study of WannaCry threat: Ransomware attack 2017, International Journal of Advanced Research in Computer Science, 8, 5, pp. 1938-1940, (2017)
- [4] DeFazio P A, Larsen R., The design, development & certification of the boeing 737 max, (2020)
- [5] Hawkes B., Project zero five years of 'make 0day hard, (2019)
- [6] Zhang Yan, Zhang Junwen, Zhang Dalin, Et al., Survey of directed fuzzy technology, Proc of the 9th IEEE Intl Conf on Software Engineering and Service Science (ICSESS), (2018)
- [7] Pengfei Wang, Zhou Xu, Sok: The progress, challenges, and perspectives of directed greybox fuzzing, (2020)
- [8] Li Jun, Zhao Bodong, Zhang Chao, Fuzzing: A survey, Cybersecurity, 1, 1, pp. 1-6, (2018)
- [9] Liang Hongliang, Pei Xiaoxiao, Jia Xiaodong, Et al., Fuzzing state of the art, IEEE Transactions on Reliability, 67, 3, pp. 1199-1218, (2018)
- [10] Man'es V J M, Han H, Han C, Et al., The art, science, and engineering of fuzzing: A survey[J/OL], IEEE Transactions on Software Engineering, (2019)