KiF, Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, IPTComm '07, pp.47-56, 2007. ,
DOI : 10.1145/1326304.1326313
URL : https://hal.archives-ouvertes.fr/inria-00166947
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr, In of Lecture Notes in Computer Science, pp.343-358, 2006. ,
DOI : 10.1007/11836810_25
An infrastructure for adaptive dynamic optimization, International Symposium on Code Generation and Optimization, 2003. CGO 2003., pp.265-275, 2003. ,
DOI : 10.1109/CGO.2003.1191551
Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation, SS'07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pp.1-16, 2007. ,
FiG: Automatic Fingerprint Generation, The 14th Annual Network & Distributed System Security Conference, 2007. ,
Dispatcher, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653737
EXE: A System for Automatically Generating Inputs of Death Using Symbolic Execution, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006. ,
A data-driven finite state machine model for analyzing security vulnerabilities, Dependable Systems and Networks, 2003. Proceedings. 2003 International Conference on, pp.605-614, 2003. ,
Understanding data lifetime via whole system simulation, SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pp.22-22, 2004. ,
The Evolving Art of Fuzzing, 2006. ,
Flayer: exposing application internals, WOOT '07: Proceedings of the first USENIX workshop on Offensive Technologies, pp.1-9, 2007. ,
A threshold of ln n for approximating set cover, Journal of the ACM, vol.45, issue.4, pp.634-652, 1998. ,
DOI : 10.1145/285055.285059
Grammar-based Whitebox Fuzzing, PLDI'2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, 2008. ,
Practical taint-based protection using demand emulation, ACM SIGOPS Operating Systems Review, vol.40, issue.4, pp.29-41, 2006. ,
DOI : 10.1145/1218063.1217939
A Smart Fuzzer for x86 Executables, Third International Workshop on Software Engineering for Secure Systems (SESS'07: ICSE Workshops 2007), 2007. ,
DOI : 10.1109/SESS.2007.1
Pin: building customized program analysis tools with dynamic instrumentation, PLDI '05: Proceedings of the 2005 ACM SIGPLAN conference on Programming language design and implementation, pp.190-200, 2005. ,
Expanding human interactions for in-depth testing of web applications, 11th Symposium on Recent Advances in Intrusion Detection ? Also published as LNCS, 2008. ,
An empirical study of the reliability of UNIX utilities, Communications of the Association for Computing Machinery, vol.33, issue.12, pp.32-44, 1990. ,
How smart is Intelligent Fuzzing -or -How stupid is Dumb Fuzzing? In Defcon 15, 2007. ,
How to shadow every byte of memory used by a program, Proceedings of the 3rd international conference on Virtual execution environments , VEE '07, pp.65-74, 2007. ,
DOI : 10.1145/1254810.1254820
Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007. ,
DOI : 10.1145/1273442.1250746
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005. ,
Feedbackdirected random test generation, ICSE'07, Proceedings of the 29th International Conference on Software Engineering, pp.75-84, 2007. ,
Open Source Fuzzing Tools, Syngress, 2007. ,
Process tracing using ptrace, 2002. ,
Mutation-Based Testing of Buffer Overflow Vulnerabilities, 2008 32nd Annual IEEE International Computer Software and Applications Conference, pp.979-984, 2008. ,
DOI : 10.1109/COMPSAC.2008.123
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning, FORTE '08: Proceedings of the 28th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems, pp.299-304, 2008. ,
DOI : 10.1016/j.compeleceng.2006.06.001
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.477-486, 2007. ,
DOI : 10.1109/ACSAC.2007.27
Secure program execution via dynamic information flow tracking, ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pp.85-96, 2004. ,
Fuzzing: Brute Force Vulnerability Discovery, 2007. ,
Fuzzing for Software Security Testing and Quality Assurance, 2008. ,
A fullynon-transparent approach to the code location problem, SCOPES '08: Proceedings of the 11th International Workshop on Software & Compilers for Embedded Systems, pp.61-68, 2008. ,
Address-space layout randomization using code islands, Journal of Computer Security, vol.17, issue.3, pp.331-362, 2009. ,
DOI : 10.3233/JCS-2009-0322
URL : http://doi.org/10.3233/jcs-2009-0322
How to Do a Million Watchpoints: Efficient Debugging Using Dynamic Instrumentation, Lecture Notes in Computer Science, vol.4959, pp.147-162, 2008. ,
DOI : 10.1007/978-3-540-78791-4_10
Technopôle de Nancy-Brabois -Campus scientifique 615, rue du Jardin Botanique -BP 101 -54602 Villers-l` es-Nancy Cedex (France) Unité de recherche INRIA Futurs : Parc Club Orsay Université -ZAC des Vignes 4 ,
IRISA, Campus universitaire de Beaulieu -35042 Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l'Europe -38334 Montbonnot Saint-Ismier (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau -Rocquencourt -BP 105 -78153 Le Chesnay Cedex (France) Unité de recherche, 2004. ,
BP 105 -78153 Le Chesnay Cedex (France) http://www.inria.fr ISSN, pp.249-6399 ,