S. Bekrar, C. Bekrar, R. Groz, and L. Mounier, Finding Foftware Vulnerabilities by Smart Fuzzing, Proc. the IEEE International Conference on Software Testing, Verification and Validation (ICST, pp.427-430, 2011.
DOI : 10.1109/icst.2011.48

S. Bekrar, C. Bekrar, R. Groz, and L. Mounier, A Taint Based Approach for Smart Fuzzing, 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation, pp.818-825, 2012.
DOI : 10.1109/ICST.2012.182

URL : https://hal.archives-ouvertes.fr/hal-00857281

M. Böhme, V. T. Pham, and A. Roychoudhury, Coverage-based Greybox Fuzzing as Markov Chain, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS'16, pp.1032-1043, 2016.
DOI : 10.1145/2508859.2516736

E. Bounimova, P. Godefroid, and D. Molnar, Billions and billions of constraints: Whitebox fuzz testing in production, 2013 35th International Conference on Software Engineering (ICSE), pp.122-131, 2013.
DOI : 10.1109/ICSE.2013.6606558

J. Caballero, H. Yin, Z. Liang, and D. Song, Polyglot, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.317-329, 2007.
DOI : 10.1145/1315245.1315286

C. Cadar, V. Ganesh, P. Pawlowski, D. Dill, and D. Engler, Exe: A System for Automatically Generating inputs of Death Using Symbolic Execution, Proc. the ACM Conference on Computer and Communications Security (CCS), 2006.

S. K. Cha, M. Woo, and D. Brumley, Program-Adaptive Mutational Fuzzing, 2015 IEEE Symposium on Security and Privacy, pp.725-741, 2015.
DOI : 10.1109/SP.2015.50

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=7163057

W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irun-briz, Tupni, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.391-402, 2008.
DOI : 10.1145/1455770.1455820

J. De-ruiter and E. Poll, Protocol State Fuzzing of TLS Implementations, Proc. the USENIX Security Symposium, 2015.

J. Drake, Stagefright: Scary Code in the Heart of Android, BlackHat USA, 2015.

M. Eddington, Peach Fuzzing Platform

V. Ganesh, T. Leek, and M. Rinard, Taint-based directed whitebox fuzzing, 2009 IEEE 31st International Conference on Software Engineering, pp.474-484, 2009.
DOI : 10.1109/ICSE.2009.5070546

P. Godefroid, A. Kiezun, and M. Y. Levin, Grammar-based Whitebox Fuzzing, Proc. the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pp.206-215, 2008.
DOI : 10.1145/1379022.1375607

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.165.770&rep=rep1&type=pdf

P. Godefroid, M. Y. Levin, and D. Molnar, SAGE, Communications of the ACM, vol.55, issue.3, p.20, 2012.
DOI : 10.1145/2093548.2093564

P. Godefroid, M. Y. Levin, and D. A. Molnar, Automated Whitebox Fuzz Testing, Proc. the Network and Distributed System Security Symposium (NDSS), pp.151-166, 2008.

C. Holler, K. Herzig, and A. Zeller, Fuzzing with Code Fragments, Proc. the USENIX Security Symposium, pp.445-458, 2012.

T. Klein, A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security, 2011.

W. H. Lee, M. Srirangam-ramanujam, and S. Krishnan, On Designing an Efficient Distributed Black-Box Fuzzing System for Mobile Devices, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, pp.31-42, 2015.
DOI : 10.1007/978-94-015-3711-7

C. Lewis, B. Rhoden, and C. Sturton, Using Structured Random Data to Precisely Fuzz Media Players, 2007.

Z. Lin and X. Zhang, Deriving input syntactic structure from execution, Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of software engineering, SIGSOFT '08/FSE-16, pp.83-93, 2008.
DOI : 10.1145/1453101.1453114

URL : http://www.cs.purdue.edu/homes/zlin/file/FSE08.pdf

B. P. Miller, Fuzz Testing of Application Reliability, 2007.

B. P. Miller, L. Fredriksen, and B. So, An empirical study of the reliability of UNIX utilities, Communications of the ACM, vol.33, issue.12, pp.32-44, 1990.
DOI : 10.1145/96267.96279

C. Miller and Z. N. Peterson, Analysis of Mutation and Generation-based Fuzzing, Independent Security Evaluators, 2007.

C. Mulliner and C. Miller, Fuzzing the Phone in Your Phone, In: BlackHat USA, vol.25, 2009.

A. Rebert, S. K. Cha, T. Avgerinos, J. Foote, D. Warren et al., Optimizing Seed Selection for Fuzzing, Proc. the USENIX Security Symposium, pp.861-875, 2014.

J. Röning, M. Lasko, A. Takanen, and R. Kaksonen, Protos-systematic Approach to Eliminate Software Vulnerabilities, 2002.

N. Stephens, J. Grosen, C. Salls, A. Dutcher, R. Wang et al., Driller: Augmenting Fuzzing Through Selective Symbolic Execution, Proceedings 2016 Network and Distributed System Security Symposium, 2016.
DOI : 10.14722/ndss.2016.23368

M. Sutton and A. Greene, The Art of File Format Fuzzing, In: BlackHat USA, 2005.

A. Takanen, J. D. Demott, and C. Miller, Fuzzing for Software Security Testing and Quality Assurance, 2008.

D. Thiel, Exposing Vulnerabilities in Media Software, In: BlackHat EU, 2008.

T. Wang, T. Wei, G. Gu, and W. Zou, TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection, 2010 IEEE Symposium on Security and Privacy, pp.497-512, 2010.
DOI : 10.1109/SP.2010.37

URL : http://faculty.cse.tamu.edu/guofei/paper/TaintScope-Oakland10.pdf

M. Woo, S. K. Cha, S. Gottlieb, and D. Brumley, Scheduling black-box mutational fuzzing, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013.
DOI : 10.1145/2508859.2516736

M. Zalewski, American Fuzzy Lop (AFL) fuzzer