[1] 陈衍铃,王正. 模糊测试研究进展[J]. 计算机应用与软件, 2011,28(7):291-293.
[2] 中国信息安全测评中心. 信息安全漏洞周报[DB/OL]. http://www.cnnvd.org.cn/news/vulreport#, 2015-12-04.
[3] Miller B P, Fredriksen L, So B. An empirical study of the reliability of Unix utilities[J]. Communications of the ACM, 1990,33(12):32-44.
[4] 彭越. Web脆弱性检测关键技术的研究与系统实现[D]. 北京:北京邮电大学, 2014.
[5] Hammersland R, Snekkenes E. Fuzz Testing of Web Applications[DB/OL]. http://www.aqualab.cs.northwestern.edu/conferences/HotWeb08/papers/Hammersland-FTW.pdf, 2012-12-20.
[6] Bozic J, Garn B, Kapsalis I, et al. Attack pattern-based combinatorial testing with constraints for Web security testing[C]// Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS). 2015:207-212.
[7] Garn B, Kapsalis I, Simos D E, et al. On the applicability of combinatorial testing to Web application security testing: A case study[C]// Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Automation and Model-based Testing. 2014:16-21.
[8] Duchene F, Groz R, Rawat S, et al. XSS vulnerability detection using model inference assisted evolutionary fuzzing[C]// Proceedings of the IEEE 5th International Conference on Software Testing, Verification and Validation. 2012:815-817.
[9] 李彤,黄轩,刘海燕,等. 基于Fuzzing的软件漏洞发掘技术[J]. 价值工程, 2014,33(3):197-199.
[[1]0] Hydara I, Sultan A B M, Zulzalil H, et al. An approach for cross-site scripting detection and removal based on genetic algorithms[C]// Proceedings of the 9th International Conference on Software Engineering Advances. 2014:227-232.
[[1]1] 边霞,米良. 遗传算法理论及其应用研究进展[J]. 计算机应用研究, 2010,27(7):2425-2429.
[[1]2] Srivastava P R, Kim T. Application of genetic algorithm in software testing[J]. International Journal of Software Engineering and Its Applications, 2009,3(4):87-96.
[[1]3] Banković Z, Stepanović D, Bojanić S, et al. Improving network security using genetic algorithm approach[J]. Computers & Electrical Engineering, 2007,33(5-6):438-451.
[[1]4] Islam A B M, Azad A, Alarm K, et al. Security attack detection using genetic algorithm (GA) in policy based network[C]// Proceedings of the 2007 International Conference on Information and Communication Technology. 2007:341-347.
[[1]5] DeMott J D, Enbody R J, Punch W F. Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing[DB/OL]. https://www.blackhat.com/presentations/bh-usa-07/DeMott_Enbody_and_Punch/Whitepaper/bh-usa-07-demott_enbody_and_punch-WP.pdf, 2007-12-20.
[[1]6] Del Grosso C, Antoniol G, Merlo E, et al. Detecting buffer overflow via automatic test input data generation[J]. Computers & Operations Research, 2008,35(10):3125-3143. |