Introduction
Fuzzing-学习资源汇总
污点分析-学习资源汇总
符号执行-学习资源汇总
恶意样本检测-学习资源汇总
逆向工程-学习资源汇总
工作面试复习资料汇总
信息安全相关会议期刊汇总
Paper
<> AutomatedExploit
HEAPHOPPER Bringing Bounded Model Checking to Heap Implementation Security
<> Fuzzing
Angora: Efficient Fuzzing by Principled Search
Automated Detection Exploitation and Elimination of Double-Fetch Bugs Using Modern CPU Features
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels
Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
Enforcing Unique Code Target Property for Control-Flow Integrity
Fuzzing: Art, Science, and Engineering
NAR-Miner Discovering Negative Association Rules from Code
SoK: Security Evaluation of Home-Based IoT Deployments
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking With Orders-of-Magnitude Performance Boost
Using Logic Programming to Recover C++ Classes and Methods From Compiled Executables
VUzzer: Application-aware Evolutionary Fuzzing
From automation to intelligence Survey of research on vulnerability discovery techniques
NEUZZ Efficient FuzzinG with Neural Program Smoothing
HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
A Reinforcement Learning Based Approach to Automated Testing of Android Applications
Skyfire: Data-Driven Seed Generation for Fuzzing
Learn to Accelerate Identifying New Test Cases in Fuzzing
Improving Fitness Function for Language Fuzzing with PCFG Model
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability
Experimenting machine learning techniques to predict vulnerabilities
A Review of Machine Learning in Software Vulnerability Research
Sofware Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
A Survey on Source Code Review Using Machine Learning
<> MaliciousSampleDetecion
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning
<> ReverseEngineering
Lord-of-the-X86-Rings-A-Portable-User-Mode-Privilege-Separation-Architecture-on-X86
Superset-Disassembly-Statically-Rewriting-X86-Binaries-Without-Heuristics-Disassembly
<> SymbolicExecution
<> TaintAnalysis
database
Published with GitBook
工作面试复习资料汇总
本文主要是收集和整理研三同学在工作面试中遇到的问题及其相应的回答,以及个人整理的复习资料汇总
问题汇总
1.问题1xxx
回答xxx
问题2xxx
回答xxx
复习资料汇总
xxx
results matching "
"
No results matching "
"