PaiMei and the five finger exploding palm RE techniques, presented at REcon (www.recon.cx/en/s/pamini, 2006. ,
Sulley: Pure Python fully automated and unattended fuzzing framework (code.google.com, 2010. ,
LZFuzz: A Fast Compression- Based Fuzzer for Poorly Documented Protocols, 2008. ,
Exploiting 802, 2007. ,
EXE, ACM Transactions on Information and System Security, vol.12, issue.2, pp.1-38, 2008. ,
DOI : 10.1145/1455518.1455522
Hacking Layer 2: Fun with Ethernet switches, presented at the BlackHat USA Conference (www.blackhat.com/presentations/bh-usa- 02/bh-us-02-convery-switches, 2002. ,
Unraveling SCADA protocols: Using Sulley fuzzer, presented at the DefCon 15 Hacking Conference, 2007. ,
ICCPSic assessment tool set released, Sunrise, Florida (www .digitalbond.comiccpsic-assessment-tool-set-released), 2007. ,
Peach Fuzzing Platform (peachfuzzer.com), 2010. ,
Black ops: Pattern recognition, presented at the BlackHat USA Conference (www.slideshare.net, 2006. ,
Memory corruption attacks: The (almost) complete history, presented at the BlackHat USA Conference (media.blackhat.com/bh-us- 10USA-2010-Meer-History-of-Memory-Cor ruption-Attacks-wp, 2010. ,
An empirical study of the reliability of UNIX utilities, Communications of the ACM, vol.33, issue.12, pp.32-44, 1990. ,
DOI : 10.1145/96267.96279
Analysis of Mutation and Generation-Based Fuzzing, White Paper, Independent Security Evaluators, 2007. ,
Identifying hierarchical structure in sequences: A linear-time algorithm, Journal of Artificial Intelligence Research, vol.7, pp.67-82, 1997. ,
arp-sk: A Swiss knife tool for ARP (sid.rstack.org/arp-sk), 2004. ,
PROTOS: Systematic approach to eliminate software vulnerabilities, presented at Microsoft Research, 2002. ,
A universal algorithm for sequential data compression, IEEE Transactions on Information Theory, vol.23, issue.3, pp.337-343, 1977. ,
DOI : 10.1109/TIT.1977.1055714
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.8921