Author:
Becker Sheila,Abdelnur Humberto,State Radu,Engel Thomas
Publisher
Springer Berlin Heidelberg
Reference21 articles.
1. Abdelnur, H.J., State, R., Festor, O.: KiF: a stateful SIP fuzzer. In: IPTComm 2007: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, pp. 47–56. ACM, New York (2007)
2. Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing. Immunity Inc. (February 2002), http://www.immunitysec.com/resources-papers.shtml
3. Cadar, C., Twohey, P., Ganesh, V., Engler, D.: EXE: Automatically Generating Inputs of Death Using Symbolic Execution. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), Virginia, USA (November 2006)
4. Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol specification extraction. In: IEEE Symposium on Security and Privacy, pp. 110–125 (2009)
5. Dowd, M., McDonald, J., Schuh, J.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, Reading (2006)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献