1 |
Danielle Anne Veluz, "Zero-day Exploit Hits All Versions of Internet Explorer", Trend Micro, Last visited 2014-02-15.
|
2 |
Wikipedia, "Document Object Model", http://en.wikipedia.org/wiki/Document_Object_Model, Apr. 2013.
|
3 |
Wikipedia, "Heap spraying", http://en.wikipedia.org/wiki/Heap_spraying, Jan. 2014.
|
4 |
CVEDetails, "Microsoft Internet Explorer : List of security vulnerabilities", http://www.cvedetails.com/vulnerability-list/vendor_id-26/product_id-9900/Microsoft-Internet-Explorer.html, Jun. 2014.
|
5 |
StatCounter, "StatCounter Global Stats- Top 7 Desktop OSs in South Korea from Jan 2012 to May 2014", http://gs.statcounter.com/#desktop-os-KR-monthly-201201-201405, Jun. 2014.
|
6 |
Minho Kim, Seongbin Park, Jino Yoon, Minsoo Kim, and Bong-Nam Noh, "File Analysis Data Auto-Creation Model For Peach Fuzzing", Journal of the KITS. vol. 24, no. 2, pp. 327-333, Apr. 2014.
과학기술학회마을
DOI
|
7 |
IBM, "IBM X-Force 2012 Trend and Risk Report", http://www.ibm.com/ibm/files/I218646H25649F77/Risk_Report.pdf, IBM Security Systems, Mar. 2013.
|
8 |
FireEye, "FireEye, 2014 Forecast Report of Security Threat", FireEye Korea, http://www.fireeye.com/kr/ko/news-events/press-releases/read/fireeye-2014-secyrity-threat-forecase-report, Nov. 2013.
|
9 |
Godefroid, Patrice, Adam Kiezun, and Michael Y. Levin. "Grammar-based whitebox fuzzing." ACM SIGPLAN Notices. Vol. 43. No. 6. ACM, 2008.
|
10 |
Holler, Christian. "Grammar-based interpreter fuzz testing." Master's Thesis Dissertation, Department of Computer Science, Saarland University, Jun. 2011.
|
11 |
W3C, "DOM Event Architecture", http://www.w3.org/TR/DOM-Level-3-Events/#dom-event-architecture, Nov. 2013.
|
12 |
Grinder, https://github.com/stephenfewer/grindjer.
|
13 |
Tao Guo, Puhan Zhang, Xin Wang, and Qiang Wei, "GramFuzz: Fuzzing Testing of Web Browsers Based on Grammar Analysis and Structural Mutation", ICIA 2013 Second International Conference, pp. 212-215, IEEE, Sep. 2013.
|
14 |
Exploit-DB, "MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free", http://www.exploit-db.com/exploits/28974/, Oct. 2013.
|
15 |
Exploit-DB, "Micorosft Internet Explorer SetMouseCapture Use-After-Free", http://www.exploit-db.com/exploits/28682/,Oct.2013.
|
16 |
Bugzilla, "Bug 332602 - crashes found by hamachi fuzzer at metasploit", https://bugzilla.mozilla.org/show_bug.cgi?id=332602, [Attachment] https://bug332602.bugzilla.mozilla.org/attachment.cgi?id=217061, Apr. 2006.
|
17 |
Lcamtuf, "Announcing ref_fuzz, a 2 year old fuzzer", Lcamtuf's blog, http://lcamtuf. blogspot.kr/2010/06/announcing-reffuzz-2yo-fuzzer.html, Jun. 2010.
|
18 |
Rosario Valotta, "Taking Browsers Fuzzing To The Next (DOM) Level", DeepSec 2012.
|