1 |
Cylance, White Papers, Cylance Inc, c2017, From: https://www.cylance.com/content/dam/cylance/pdfs/white_papers/MathvsMalware.pdf, (accessed Oct., 11, 2017).
|
2 |
For All Secure, Unleashing-mayhem, For All Secure, 2016 Feb 9, From: https://forallsecure.com/blog/2016/02/09/unleashing-mayhem/, (accessed Oct., 11, 2017).
|
3 |
IBM, Congnitive security white paper, IBM, c2000, From: http://www-03.ibm.com/security/kr/ko/cognitive/whitepaper/#cognitive-security-ibm-data-security, (accessed Oct., 11, 2017).
|
4 |
P.Miller, L.Fredriksen, Bryan So, "An empirical study of the reliability of UNIX utilities", Communications of the ACM, vol. 33, Issue 12, pp. 32-44, 1990. DOI: https://doi.org/10.1145/96267.96279
DOI
|
5 |
PeachTech, Peach Fuzzer Community Edition, Deja vu Security, 2014 Feb 23, From: http://community.peachfuzzer.com/WhatIsPeach.html, (accessed Oct., 11, 2017).
|
6 |
Nick Stephens, John Grosen, Christopher Salls, Andrew Dutcher, Ruoyu Wang, Jacopo Corbetta, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna, "Driller: Augmenting Fuzzing Through Selective Symbolic Execution", the Network and Distributed System Security Symposium, 2016. DOI: https://doi.org/10.14722/ndss.2016.23368
|
7 |
Cristian Cadar, Daniel Dunbar, Dawson Engler, "KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs", Operating Systems Design and Implementation, vol. 8, 2008.
|
8 |
Liviu Ciortea, Cristian Zamfir, Stefan Bucur, Vitaly Chipounov, George Candea, "Cloud9: A Software Testing Service", 3rd SOSP Workshop on Large Scale Distributed Systems and Middleware, vol. 43, no. 4, 2009.
|
9 |
Stephanie Forrest, ThanhVu Nguyen, Westley Weimer, Claire Le Goues, "A Genetic Programming Approach to, Automated Software Repair", Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation, pp. 947-954, 2009.
|
10 |
Chen Liu, Jinqiu Yang, Lin Tan, "R2Fix: Automatically Generating Bug Fixes from Bug Reports", Proceedings of the International Conference on Software Testing, Verification and Validation, pp. 282-291, 2013. DOI: https://doi.org/10.1109/ICST.2013.24
DOI
|
11 |
Dong-Sun Kim, Jae-Chang Nam, Jae-Woo Song, Sunghun Kim, "Automatic patch generation learned from human-written patches", Proceedings of the International Conference on Software Engineering, pp. 802-811, 2013. DOI: https://doi.org/10.1109/ICSE.2013.6606626
DOI
|
12 |
Yan Shoshitaishvili, Ruoyu Wang, Christopher Salls, Nick Stephens, Mario Polino, Andrew Dutcher, John Grosen, Siji Feng, Christophe Hauser, Christopher Kruegel, Giovanni Vigna, UC Santa Barbara, "SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis", Security and Privacy (SP), pp. 138-157, 2016.
|
13 |
Maksim O, Shudrak, Vyacheslav V.Zolotarev, "Improving Fuzzing Using Software Complexity Metrics", International Conference on Information Security and Cryptology, pp. 246-261, 2015.
|
14 |
Yeon-Suk Choi, "A Study on security characteristics and vulnerabilities of BAS(Building Automation System)", Journal of the Korea Academia-Industrial, vol .18, no. 4, pp. 669-676, cooperation Society, 2017. DOI: https://doi.org/10.5762/KAIS.2017.18.4.669
DOI
|
15 |
U.S. National Vulnerability Database(NVD), CVE LIST, The MITRE Corporation, c2015(cited 1999), From: https://cve.mitre.org/cve/, (accessed Oct., 11, 2017).
|
16 |
So-Yeon Min, Chan-Suk Jung, Kwang-Hyong Lee, Eun-Sook Cho, Tae-Bok Yoon, Seung-Ho You," Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Uptrading System Vulnerability", Journal of the Korea Academia-Industrial cooperation Society, vol. 18, no. 7, pp. 1-8, 2017. DOI: https://doi.org/10.5762/KAIS.2017.18.7.1
DOI
|
17 |
Darktrace. Support_1, FRENTREE, c2013, From: http://www.frentree.com/Darktrace.pdf, (accessed Oct., 11, 2017).
|
18 |
Defense Advanced Research Projects Agency(DARPA), Program, DARPA, c2016, From: https://www.darpa.mil/program/cyber-grand-challenge, (accessed Oct., 11, 2017).
|