期刊文献+

模糊测试研究进展 被引量:7

ADVANCEMENT OF THE STUDY ON FUZZY TESTING
下载PDF
导出
摘要 通过介绍发现安全漏洞的三种方法,引出模糊测试。首先介绍了模糊测试的历史,接着从模糊测试的一般流程,模糊测试方法,测试对象,测试中存在的问题四个方面详细介绍了模糊测试的研究现状,最后根据模糊测试的研究现状和特点归纳了今后模糊测试的研究方向和研究方法。 The paper introduces three approaches in detecting security leakages.Then it induces the concept of fuzzy testing.Firstly the fuzzy testing history is introduced.Then the contemporary environment of fuzzy testing research is elaborated in detail from four aspects of its general workflow,fuzzy testing methods,objects to test and problems in testing.On the basis of the contemporary environment of fuzzy testing research and its characteristics,the paper has made conclusion for research orientation and methods for fuzzy testing in the future.
作者 陈衍铃 王正
出处 《计算机应用与软件》 CSCD 2011年第7期291-293,295,共4页 Computer Applications and Software
关键词 模糊测试 协议 测试用例 变异 生成 Fuzzy testing Protocol Test case Variation Generate
  • 相关文献

参考文献47

  • 1Sutton M, Amini A G P. Fuzzing: Brute Force Vulnerability Discovery[M].黄陇,于莉莉,李虎,译.北京:机械工业出版社,2009.
  • 2http ://www. microsoft, com/whdc/devtools/tools/PREfast, mspx.
  • 3http ://cscope. sourceforge, net/.
  • 4http ://lxr. linux, no.
  • 5http ://www. fortifysoftware, corn/security-resources/rats, jsp.
  • 6http ://www. cigital, com/itsd/.
  • 7http ://lclint. cs. virginia, edu/.
  • 8http ://www. dwheeler, com/flawfinder/.
  • 9http ://jlint. sourceforge, net/.
  • 10http ://www. owasp, cor/software/labs/codespy, html.

同被引文献39

  • 1张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 2SUTTON M., GREENE A,AMINI P. Fuzzingbrute force vulnerabi- lity discovery[ J ]. Pearson Education, 2007( 7 ).
  • 3Hyunsook Do,Sebastian Elbaum,Gregg Rothermel.Supporting Controlled Experimentation with Testing Techniques: An Infrastructure and its Potential Impact[J].Empirical Software Engineering.2005(4)
  • 4中国信息安全测评中心.信息安全漏洞周报[DB/OL].http ://www. cnnvd, org, cn/news/vulreport#, 2015-12-04.
  • 5Miller B P, Fredriksen L, So B. An empirical study of the reliability of Unix utilities [ J ]. Communications of the ACM, 1990,33(12) :32-44.
  • 6Hammersland R, Snekkenes E. Fuzz Testing of Web Ap- plications [ DB/OL]. http ://www. aqualab, cs. northwest- ern. edu/conferences/HotWeb08/papers/Hammersland- FTW. pdf, 2012-12-20.
  • 7Bozic J, Garn B, Kapsalis I, et al. Attack pattern-based combinatorial testing with constraints for Web security tes- ting[ C ]// Proceedings of the 2015 IEEE International Conference on Software Quality, Reliability and Security (QRS). 2015:207-212.
  • 8Gain B, Kapsalis I, Simos D E, et al. On the applicability of combinatorial testing to Web application security testing: A case study[ C]//Proceedings of the 2014 Workshop on Joining AcadeMiA and Industry Contributions to Test Auto- mation and Model-based Testing. 2014:16-21.
  • 9Duchene F, Groz R, Rawat S, et al. XSS vulnerability de- tection using model inference assisted evolutionary fuzzing [ C]// Proceedings of the IEEE 5th International Confer- ence on Software Testing, Verification and Validation. 2012:815-817.
  • 10Hydara I, Sultan A B M, Zulzalil H, et al. An approach for cross-site scripting detection and removal based on ge- netic algorithms[ C ]/! Proceedings of the 9th International Conference on Software Engineering Advances. 2014:227- 232.

引证文献7

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部