参考资料 ================================================== 参考文献 -------------------------------------------------- 1. ``IEEE 2016`` ``Black Box`` Lin Y D, Liao F Z, Huang S K, et al. Browser fuzzing by scheduled mutation and generation of document object models[C]// International Carnahan Conference on Security Technology. IEEE, 2016:1-6. 2. ``IEEE 2012`` ``White Box`` Huang S K, Huang M H, Huang P Y, et al. CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations[C]// IEEE Sixth International Conference on Software Security and Reliability. IEEE, 2012:78-87. 3. ``Usenix 2014`` ``Seed Generation`` Rebert A, Sang K C, Grieco G, et al. Optimizing seed selection for fuzzing[C]// Usenix Conference on Security Symposium. USENIX Association, 2014:861-875. 4. ``ACM 2013`` ``Black Box`` Woo M, Sang K C, Gottlieb S, et al. Scheduling black-box mutational fuzzing[C]// ACM Sigsac Conference on Computer & Communications Security. ACM, 2013:511-522. 5. 钱文祥. 白帽子讲浏览器安全[M]. 电子工业出版社, 2016. 6. ``ACM 2013`` Paige M. The tangled web: a guide to securing modern web applications by Michal Zalewski[M]. ACM, 2013. 7. ``IEEE 2013`` ``Black Box`` Guo T, Zhang P, Wang X, et al. GramFuzz: Fuzzing testing of web browsers based on grammar analysis and structural mutation[C]// Second International Conference on Informatics and Applications. IEEE, 2013:212-215. 8. ``ACM 2013`` ``White Box`` Avgerinos T, Sang K C, Rebert A, et al. Automatic exploit generation[J]. Communications of the Acm, 2014, 57(2):74-84. 9. ``IEEE 2010`` ``Symbolic Execution`` Schwartz E J, Avgerinos T, Brumley D. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)[C]// Security and Privacy. IEEE, 2010:317-331. 10. ``ACM 2013`` ``Symbolic Execution`` Cadar C, Sen K. Symbolic execution for software testing: three decades later[J]. Communications of the Acm, 2013, 56(2):82-90. 11. ``Fuzz PNG`` Miller C, Peterson Z N J. Analysis of mutation and generation-based fuzzing[J]. Independent Security Evaluators, Tech. Rep, 2007. 12. ``IEEE 2005`` Oehlert P. Violating Assumptions with Fuzzing[J]. IEEE Security & Privacy, 2005, 3(2):58-62. 13. ``Usenix 2012`` Holler C, Herzig K, Zeller A. Fuzzing with Code Fragments[J]. Proc Usenix Security, 2012:445--458. 14. ``IEEE CCIS2012`` ``Fuzz BMP`` Hou Y, Tao G, Shi Z, et al. Research on Android browser fuzzing based on bitmap structure[M]. 2013. 15. ``ACM 2017`` Guo R. MongoDB's JavaScript Fuzzer[M]. ACM, 2017. 16. ``Usenix 2018`` Yun I, Lee S, Xu M, et al. QSYM: A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing[C]//27th USENIX Security Symposium (USENIX Security 18). USENIX Association, 2018. 工具 -------------------------------------------------- 1. `zuff fuzzer `_ 2. `CERT Basic Fuzzing `_ 3. `CERT Failure Observation Engine `_ 4. `bf3 `_ 5. `Grinder `_ 6. `axman `_ 7. `exploitable `_ 8. `jsfunfuzz `_ 9. `metasm `_ 10. `web platform tests `_ 11. `oss fuzz `_ 12. `Domato `_ 13. `mitigationview `_ 14. `sandbox attacksurface analysis tools `_ 15. `NodeFuzz `_ 16. `wadi `_ 17. `Angora `_ 18. `afl `_ 19. `neuzz `_ Blog or Talks -------------------------------------------------- 1. `浏览器fuzz工具 `_ 2. `浏览器fuzz框架 `_ 3. `nduja `_ 4. `Morph `_ 5. `R Valotta `_ 6. `符号执行入门 `_ 7. `blueclosure blog `_ 8. `MongoDBs fuzzer `_ 9. `JavaScript engine fundamentals optimizing prototypes `_ 10. `深入理解Webkit `_ 11. `Timeline of Web Browsers `_ 12. `Browser UI Security `_ 13. `life of a pixel `_ 14. `Inline Caching in JavaScriptCore `_ 15. `webidl `_ 16. `The Great DOM Fuzz-off of 2017 `_ 17. `Finding and Exploiting Safari Bugs using Publicly Available Tools `_ 18. `wabt `_ 19. `ecma262 `_ 20. `strengthening microsoft edge sandbox `_ 21. `breaking the local browser sandbox `_ 22. `Forshaw Digging For IE11 Sandbox Escapes `_ 23. `digging into turbofan jit `_ 24. `liftoff `_ 25. `fuzzing binaries without execve `_ 26. `fuzzingbook `_ 漏洞相关 -------------------------------------------------- 1. `js-vuln `_ 2. `cve-2018-4192 and cve-2018-4262 `_ 3. `cve-2016-0189 `_ 4. `CVE-2018-4121 Safari Wasm Exploit `_ 5. `Enforcement of Bounds Checks in Native JIT Code `_ 6. `The Advanced Exploitation of 64-bit Edge Browser Use-After-Free Vulnerability on Windows 10 `_ 7. `From Assembly to JavaScript and Back `_ 8. `awesome browser exploit `_ 9. `pwnjs `_ 10. `Write-up for CVE-2018-8495 `_ 11. `blackhat us 18 attacking client side jit compilers `_ 12. `WebExtension security Part1 `_ 13. `cve-2018-8629 `_ 14. `Introduction to SpiderMonkey exploitation `_ 15. `webkit bugmap `_ 规范 / 手册 -------------------------------------------------- 1. `wc3规范 `_ 2. `whatwg `_ 3. `MDN `_ 4. `Mozilla Source Tree Documentation `_ 5. `HTML Standard by whatwg `_ 6. `V8 Documentation `_ 7. `chromium documents `_ 8. `chromium design documents `_ 9. `V8 Ignition online doc `_ 10. `SpiderMonkey `_