[1]
Stutton M., Greene A. and Amini P., Fuzzing: Brute Force Vulnerability Discoverytab: Threesome. London, UK: Pearson Education, 2007.
[2]
Wang W., Ding H., and Zeng Q., Research and implementation of test case generation based on formal description, (in Chinese), Journal of Computer Applications, vol. 28, no. 4, pp. 1018-1022, 2008.
[3]
Zhu Z., Xu Y., and Zhou M., Generation method survey of network protocol testing, (in Chinese), Computer Engineering and Applications, vol. 41, no. 15, pp. 172-175, 2005.
[4]
Shu G., Hsu Y., and Lee D., Detecting communication protocol security flaws by formal fuzz testing and machine learning, Lecture Notes in Computer Science, vol. 5048, pp. 299-304, 2008.
[5]
Banks G., Cova M., Felmetsger V., Almeroth K., Kemmerer R., and Vigna G., SNOOZE: Toward a stateful network protocol fuzzer, Lecture Notes in Computer Science, vol. 4176, pp. 343-358, 2006.
[6]
Abdelnur H. J., State R., and Festor O., KIF: A stateful SIP fuzzer, in Proc. 1st Int. Principles, Systems & Applications of IP Telecommunications Conf., New York, NY, USA, 2007, pp. 47-56.
[7]
Raniwala A., Sharma S., De P., Krishnan R., and Chiueh T. C., Evaluation of a stateful tansport protocol for multi-channel wireless mesh networks, in Proc. 15th IEEE Int. Quality of Service Workshop, Evanston, IL, USA, 2007, pp. 74-82.
[8]
Alrahem T., Chen A., DiGiussepe N., Gee J., Hsiao S., and Mattox S., INTERSTATE: A stateful protocol fuzzer for SIP, presented at DEFCON 15, Las Vegas, NV, USA, 2007.
[9]
Chen T. Y., Kuo F. C., Merkel R. G., and Tse T. H., Adaptive random testing: The art of test case diversity, Journal of Systems and Software, vol. 83, no. 1, pp. 60-66, 2010.
[10]
Kitagawa T., Hanaoka M., and Kono K., AspFuzz: A state-aware protocol fuzzer based on application-layer protocols, in Proc. IEEE Computers & Communications Symposium, Riccione, Italy, 2010, pp. 202-208.
[11]
Akbar M. A. and Faroop M., RTP-miner: A real-time security framework for RTP fuzzing attacks, in Proc. 20th Int. Network & Operating Systems Support for Digital Audio & Video Workshop, Amsterdam, the Netherlands, 2010, pp. 87-92.
[12]
Gorbunov S. and Rosenbloom A., Autofuzz: Automated network protocol fuzzing framework, International Journal of Computer Science & Network Security, vol. 10, no. 8, pp. 239-245, 2010.
[13]
Li M. W., Zhang A. F., Liu J. C., and Li Z. T., An automatic network protocol fuzz testing and vulnerability discovering method, (in Chinese), Chinese Journal of Computers, vol. 34, no. 2, pp. 242-255, 2011.
[14]
Sui A. F., Tang W., Hu J. J., and Li M. Z., An effective fuzz input generation method for protocol testing, in Proc. 13th IEEE Int. Communication Technology Conf., Ji’nan, China, 2011, pp. 728-731.
[15]
Tsankov P., Dashti M. T., and Basin D., SECFUZZ: Fuzz-testing security protocols, in Proc. 7th Int. Automation of Software Test Workshop, Zurich, Switzerland, 2012, pp. 1-7.
[16]
Seo D., Lee H., and Nuwere E., SIPAD: SIP-VoIP anomaly detection using a stateful rule tree, Computer Communications, vol. 36, no. 5, pp. 562-574, 2013.
[17]
Pan F., Hou Y., Hong Z., Wu L., and Lai H., Efficient model-based fuzz testing using higher-order attribute grammars, Journal of Software, vol. 8, no. 3, pp. 645-651, 2013.
[18]
Ma R., Ji W. D., Hu C. Z., Shan C., and Peng W., Fuzz testing data generation for network protocol using classificaiton tree, in Proc. Communication Security Conf., Beijing, China, 2014, pp. 97-101.
[19]
Ma R., Wang D. G., Hu C. Z., Ji W. D., and Xue J. F., Test data generation for stateful network protocol fuzzing using a rule-based state machine, Tsinghua Science and Technology, vol. 21, no. 3, pp. 352-360, 2016.
[20]
Hu C. Z., Ma R., Han X., Shan C., and Wang Y., A rule-based method of designing model for stateful network protocol, (in Chinese), China Patent CN201410333944.0, July 14, 2014.