H. J. Abdelnur, R. State, and O. Festor, KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007.
DOI : 10.1145/1326304.1326313

URL : https://hal.archives-ouvertes.fr/inria-00166947

G. Banks, M. Cova, V. Felmetsger, K. C. Almeroth, R. A. Kemmerer et al., SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr, In of Lecture Notes in Computer Science, pp.343-358, 2006.
DOI : 10.1007/11836810_25

D. Bruening, T. Garnett, and S. Amarasinghe, An infrastructure for adaptive dynamic optimization, International Symposium on Code Generation and Optimization, 2003. CGO 2003., pp.265-275, 2003.
DOI : 10.1109/CGO.2003.1191551

D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song, Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-16, 2007.

J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song et al., FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007.

J. Caballero, P. Poosankam, C. Kreibich, and D. Song, Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009.
DOI : 10.1145/1653662.1653737

C. Cadar, P. Twohey, V. Ganesh, and D. Engler, EXE: A System for Automatically Generating Inputs of Death Using Symbolic Execution, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006.

S. Chen, Z. Kalbarczyk, J. Xu, and R. K. Iyer, A data-driven finite state machine model for analyzing security vulnerabilities, Dependable Systems and Networks, 2003. Proceedings. 2003 International Conference on, pp.605-614, 2003.

J. Chow, B. Pfaff, T. Garfinkel, K. Christopher, and M. Rosenblum, Understanding data lifetime via whole system simulation, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.22-22, 2004.

J. Demott, The Evolving Art of Fuzzing, 2006.

W. Drewry and T. Ormandy, Flayer: exposing application internals, WOOT '07: Proceedings of the first USENIX workshop on Offensive Technologies, pp.1-9, 2007.

U. Feige, A threshold of ln n for approximating set cover, Journal of the ACM, vol.45, issue.4, pp.634-652, 1998.
DOI : 10.1145/285055.285059

P. Godefroid, A. Kie´zunkie´zun, and M. Y. Levin, Grammar-based Whitebox Fuzzing, PLDI'2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008.

A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand, Practical taint-based protection using demand emulation, ACM SIGOPS Operating Systems Review, vol.40, issue.4, pp.29-41, 2006.
DOI : 10.1145/1218063.1217939

A. Lanzi, L. Martignoni, M. Monga, and R. Paleari, A Smart Fuzzer for x86 Executables, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007), 2007.
DOI : 10.1109/SESS.2007.1

C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser et al., Pin: building customized program analysis tools with dynamic instrumentation, PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.190-200, 2005.

S. Mcallister, E. Kirda, and C. Krügel, Expanding human interactions for in-depth testing of web applications, 11th Symposium on Recent Advances in Intrusion Detection ? Also published as LNCS, 2008.

P. Barton, L. Miller, B. Fredriksen, and . So, An empirical study of the reliability of UNIX utilities, Communications of the Association for Computing Machinery, vol.33, issue.12, pp.32-44, 1990.

C. Miller, How smart is Intelligent Fuzzing -or -How stupid is Dumb Fuzzing? In Defcon 15, 2007.

N. Nethercote and J. Seward, How to shadow every byte of memory used by a program, Proceedings of the 3rd international conference on Virtual execution environments , VEE '07, pp.65-74, 2007.
DOI : 10.1145/1254810.1254820

N. Nethercote and J. Seward, Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007.
DOI : 10.1145/1273442.1250746

J. Newsome and D. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.

C. Pacheco, S. K. Lahiri, M. D. Ernst, and T. Ball, Feedbackdirected random test generation, ICSE'07, Proceedings of the 29th International Conference on Software Engineering, pp.75-84, 2007.

N. Rathaus and G. Evron, Open Source Fuzzing Tools, Syngress, 2007.

S. Sandeep, Process tracing using ptrace, 2002.

H. Shahriar and M. Zulkernine, Mutation-Based Testing of Buffer Overflow Vulnerabilities, 2008 32nd Annual IEEE International Computer Software and Applications Conference, pp.979-984, 2008.
DOI : 10.1109/COMPSAC.2008.123

G. Shu, Y. Hsu, and D. Lee, Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning, FORTE '08: Proceedings of the 28th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, pp.299-304, 2008.
DOI : 10.1016/j.compeleceng.2006.06.001

S. Sparks, S. Embleton, R. Cunningham, and C. Zou, Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.477-486, 2007.
DOI : 10.1109/ACSAC.2007.27

G. , E. Suh, J. W. Lee, D. Zhang, and S. Devadas, Secure program execution via dynamic information flow tracking, ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pp.85-96, 2004.

M. Sutton, A. Greene, and P. Amini, Fuzzing: Brute Force Vulnerability Discovery, 2007.

A. Takanen, J. Demott, and C. Miller, Fuzzing for Software Security Testing and Quality Assurance, 2008.

H. Venturini, F. Riss, J. Fernandez, and M. Santana, A fullynon-transparent approach to the code location problem, SCOPES '08: Proceedings of the 11th International Workshop on Software & Compilers for Embedded Systems, pp.61-68, 2008.

H. Xu and S. J. Chapin, Address-space layout randomization using code islands, Journal of Computer Security, vol.17, issue.3, pp.331-362, 2009.
DOI : 10.3233/JCS-2009-0322

URL : http://doi.org/10.3233/jcs-2009-0322

Q. Zhao, R. M. Rabbah, S. P. Amarasinghe, L. Rudolph, and W. Wong, How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation, Lecture Notes in Computer Science, vol.4959, pp.147-162, 2008.
DOI : 10.1007/978-3-540-78791-4_10

I. Unité-de-recherche-inria-lorraine and L. , Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-l` es-Nancy Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4

I. Unité-de-recherche and . Rennes, IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004.

I. Editeur and . De-voluceau-rocquencourt, BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399