Acknowledgement
이 논문은 2024 년도 정부(과학기술정보통신부)의 재원으로 정보통신기획평가원의 지원을 받아 수행된 연구임 (No.2020-0-01840,스마트폰의 내부데이터 접근 및 보호 기술 분석)
References
- M. Zalewski, "american fuzzy lop," http://lcamtuf.coredump.cx/afl/, 2015.
- P. Godefroid, M. Y. Levin, and D. A. Molnar, "Automated whitebox fuzz testing," in Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2008.
- N. Stephens, J. Grosen, C. Salls, A. Dutcher, R. Wang, J. Corbetta, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, "Driller: Augmenting fuzzing through selective symbolic execution," in Proceedings of the 2016 Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 2016.
- R. Majumdar and K. Sen, "Hybrid Concolic Testing," in Proceedings of the 29th International Conference on Software Engineering (ICSE), Minneapolis, MN, May 2007.
- Yun, Insu, et al. "{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing." 27th USENIX Security Symposium (USENIX Security 18). 2018.
- C.-K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood, "Pin: building customized program analysis tools with dynamic instrumentation," in Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Chicago, IL, Jun. 2005.
- Leonardo De Moura and Nikolaj Bjorner. 2008. Z3: An Efficient SMT Solver. In Proceedings of the Theory and Practice of Software, 14th International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS'08/ETAPS'08). 337-340.
- A. Souchet, "what the fuzz", https://github.com/0vercl0k/wtf, 2021.
- F. Saudel and J. Salwan, "Triton: A dynamic symbolic execution framework," in Symposium sur la securit ' e des technologies de l'information 'et des communications, SSTIC, France, Rennes, June 3-5 2015.
- Google Project Zero, "WinAFL," https://github.com/googleprojectzero/winafl, 2016