The data protection problem concerning the Internet of Things (IoT) paradigm has drawn the innovation community's considerable attention. Several surveys have covered different IoT …
H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of weaknesses in a program, such as software bugs and vulnerabilities, by generating …
P Godefroid, MY Levin, D Molnar - Communications of the ACM, 2012 - dl.acm.org
SAGE: whitebox fuzzing for security testing Page 1 40 coMMunicaTions of The acM | mArCh 2012 | vol. 55 | No. 3 practice MosT CoMMunICATIons reADers might think of “program …
P Godefroid, N Klarlund, K Sen - … of the 2005 ACM SIGPLAN conference …, 2005 - dl.acm.org
We present a new tool, named DART, for automatically testing software that combines three main techniques:(1) automated extraction of the interface of a program with its external …
P Godefroid - Communications of the ACM, 2020 - dl.acm.org
Fuzzing: hack, art, and science Page 1 70 COMMUNICATIONS OF THE ACM | FEBRUARY 2020 | VOL. 63 | NO. 2 review articles FUZZING, OR FUZZ TESTING, is the process of finding …
K Sen, D Marinov, G Agha - ACM SIGSOFT Software Engineering Notes, 2005 - dl.acm.org
In unit testing, a program is decomposed into units which are collections of functions. A part of unit can be tested by generating inputs for a single entry function. The entry function may …
P Godefroid, MY Levin, DA Molnar - NDSS, 2008 - pxzhang.cn
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program …
W Stallings, L Brown - 2015 - thuvienso.hoasen.edu.vn
" It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system …
The Internet of Things is the evolutionary step of the Internet that creates a worldwide infrastructure interconnecting machines and humans. As the Internet became public in the …