[1] Standard I. IEEE standard glossary of software engineering terminology[J]. IEEE Std, 1990, 610(12):1-84.
[2] Costin A, Zarras A, Francillon A, et al. Automated dynamic firmware analysis at scale:a case study on embedded web interfaces[C]//ACM on Asia Conference on Computer and Communications Security.[S.l.]:ACM, 2016:437-448.
[3] Exploit-db. TP-Link IP cameras firmware 1. 6. 18P12-multiple vulnerabilities[EB/OL]. (2013-05-28)[2018-09-01]. https://www.exploit-db.com/exploits/25812/.
[4] Costin A, Zaddach J, Francillon A, et al. A large-scale analysis of the security of embedded firmwares[C]//USENIX Security.[S.l.]:[s.n.], 2014:95-110.
[5] Miller B P, Fredriksen L, So B. An empirical study of the reliability of UNIX utilities[J]. Communications of the ACM, 1990, 33(12):32-44.
[6] Aitel D. An introduction to SPIKE, the fuzzer creation kit, presented at the BlackHat USA conference[EB/OL]. (2011-05-20)[2018-06-10]. https://www.blackhat.com/html/bh-usa-02/bh-usa-02-speakers.html.
[7] GitHub. Sulley:a pure-python fully automated and unattended fuzzing framework[EB/OL]. (2016-10-18)[2018-09-01]. https://github.com/OpenRCE/sulley.
[8] GitHub. A fuzzing framework which uses a DSL for building fuzzers and an observer based architecture to execute and monitor them[EB/OL]. (2017-08-08)[2018-09-01]. https://github.com/MozillaSecurity/peach.
[9] Chess B, West J. Dynamic taint propagation:finding vulnerabilities without attacking[J]. Information Security Technical Report, 2008, 13(1):33-39.
[10] Pistoia M, Chandra S, Fink S J, et al. A survey of static analysis methods for identifying security vulnerabilities in software systems[J]. IBM Systems Journal, 2007, 46(2):265-288.
[11] Li P, Cui B. A comparative study on software vulnerability static analysis techniques and tools[C]//Information Theory and Information Security (ICITIS).[S.l.]:IEEE, 2010:521-524.
[12] Liu B, Shi L, Cai Z, et al. Software vulnerability discovery techniques:a survey[C]//Multimedia Information Networking and Security (MINES).[S.l.]:IEEE, 2012:152-156.
[13] Agosta G, Barenghi A, Parata A, et al. Automated security analysis of dynamic web applications through symbolic code execution[C]//Information Technology:New Generations (ITNG).[S.l.]:IEEE, 2012:189-194.
[14] Zheng Y, Zhang X. Path sensitive static analysis of web applications for remote code execution vulnerability detection[C]//International Conference on Software Engineering.[S.l.]:[s.n.], 2013:652-661.
[15] Gupta M K, Govil M C, Singh G. Static analysis approaches to detect SQL injection and cross site scripting vulnerabilities in web applications:a survey[C]//Recent Advances and Innovations in Engineering.[S.l.]:IEEE, 2014:1-5. |