DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Fuzzing
Fuzzing
Automatically Bypassing Android Malware Detection System
Moonshine: Optimizing OS Fuzzer Seed Selection with Trace Distillation
Active Fuzzing for Testing and Securing Cyber-Physical Systems
The Art, Science, and Engineering of Fuzzing: a Survey
Psofuzzer: a Target-Oriented Software Vulnerability Detection Technology Based on Particle Swarm Optimization
Configuration Fuzzing Testing Framework for Software Vulnerability Detection
Fuzzing with Code Fragments
Seed Selection for Successful Fuzzing
Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications
Fuzzy Attacks on Web Logs
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing
Find Unknown Vulnerabilities Using
Android Spyware Disease and Medication Mustafa Hassan Saad, Department of Computer Engineering MTC Cairo, Egypt
[email protected]
Guidelines on Minimum Standards for Developer Verification of Software
Efficient Program Exploration by Input Fuzzing
Designing New Operating Primitives to Improve Fuzzing Performance
The Use of Likely Invariants As Feedback for Fuzzers
Discovering Memory Corruptions in Iot Through App-Based Fuzzing
Top View
Fuzzing E-Mail Filters with Generative Grammars and N-Gram Analysis
Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability
Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification
Optimizing Seed Selection for Fuzzing
In-Memory Fuzzing for Binary Code Similarity Analysis
Fuzzing Hardware Like Software
Scalable Detection of SIP Fuzzing Attacks
ICS Protocol Fuzzing: Coverage Guided Packet Crack and Generation
Fuzzing Symbolic Expressions
Fuzz Testing
Taintscope: a Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
Fuzzing with Stochastic Feedback Processes
Fuzzing for Software Security Testing and Quality Assurance Ch00fm 5053.Qxp 5/19/08 12:45 PM Page Ii
Fuzzing for Software Vulnerability Discovery
What Is Fuzz Testing?
The Future of Grey-Box Fuzzing
A Systematic Review of Fuzzing Based on Machine Learning Techniques
Using Protocol Fuzzing to Harden Storage Systems and to Protect Them from 0-Day Attacks
Fuzzing File Systems Via Two-Dimensional Input Space Exploration
Browser Fuzzing by Scheduled Mutation and Generation Of
Gray-Box Network Fuzzing Using Genetic Algorithms and Code Coverage
Escaping the Fuzz Evaluating Fuzzing Techniques and Fooling Them with Anti- Fuzzing
Fuzzing for Software Security Testing and Quality Assurance Pdf
Introducing Probabilities Within Grey-Box Fuzzing Hänsynstagande Till Sannolikheter Inom Grey-Box Fuzzing
The Power of Fuzz Testing to Reduce Security Vulnerabilities
Malware and Attack Technologies Knowledge Area Issue
Accelerating Kernel Driver Fuzzing with Lightweight Virtual
Algorithmic Improvements for Feedback-Driven Fuzzing
Targeted Fuzzing of Android Execution Environments
What Is Fuzzing: the Poet, the Courier, and the Oracle TABLE of CONTENTS
Blending Fuzzing and Symbolic Execution for Malware Analysis
Attack Surface Analysis and Code Coverage Improvement for Fuzzing
Bbuzz: a Bit-Aware Fuzzing Framework for Network Protocol Systematic Reverse Engineering and Analysis
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Smashing Web Apps Applying Fuzzing to Web Applications and Web Services
Fuzzing: a Survey Jun Li, Bodong Zhao and Chao Zhang*
Coverage Guided Fuzzing for Javascript Engines
Fuzz Testing
Testing Network-Based Intrusion Detection Signatures Using Mutant Exploits
Fuzzing Is Proven
Malware Knowledge Area (Draft for Comment)
Usbfuzz: a Framework for Fuzzing USB Drivers by Device Emulation
Whitebox Fuzzing for Security Testing
Automatic Discovery of Evasion Vulnerabilities Using Targeted Protocol Fuzzing
Dynamic Analysis and Fuzzing Lecturer: Suman Jana Scribe: Jonas Guan Feb 21, 2019
Generating Comprehensive Data with Protocol Fuzzing for Applying Deep Learning to Detect Network Attacks
Fuzzing-Based Hard-Label Black-Box Attacks Against Machine Learning Models
Identifying and Mitigating Phishing Attack Threats in Iot Use Cases Using a Threat Modelling Approach
Hardening Ecus by Fuzz Testing
Mining the Hard-To-Reach Software Vulnerabilities Through the Target-Oriented Hybrid Fuzzer
CS412 Software Security Program Testing – Fuzzing
Fuzzing: on the Exponential Cost of Vulnerability Discovery
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing
7. Fuzzing for Cybersecurity
FUZZIFICATION: Anti-Fuzzing Techniques
Periscope: an Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
An Automated Vulnerability Detection and Remediation Method for Software Security
Deep Learning Guided Directed Fuzzing
Experiences with Model Inference Assisted Fuzzing
An Ir-Based Fuzzing Approach for Finding Context-Aware Bugs in Api-Based Systems