Becker, Sheila ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
Abdelnur, Humberto J.; MADYNES - INRIA Nancy-Grand Est, France
State, Radu ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC)
Engel, Thomas ; University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC)
External co-authors :
yes
Language :
English
Title :
An Autonomic Testing Framework for IPv6 Configuration Protocols
Publication date :
2010
Event name :
4th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2010
Event place :
Zurich, Switzerland
Event date :
June 2010
Main work title :
Lecture Notes in Computer Science 6155
Publisher :
Springer
ISBN/EAN :
978-3-642-13985-7
Pages :
65 - 76
Peer reviewed :
Peer reviewed
Commentary :
0302-9743
Mechanisms for Autonomous Management of Networks and Services
Abdelnur, H.J., State, R., Festor, O.: KiF: a stateful SIP fuzzer. In: IPTComm 2007: Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications, pp. 47-56. ACM, New York (2007)
Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing. Immunity Inc. (February 2002), http://www.immunitysec.com/resources- papers.shtml
Cadar, C., Twohey, P., Ganesh, V., Engler, D.: EXE: Automatically Generating Inputs of Death Using Symbolic Execution. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), Virginia, USA (November 2006)
Comparetti, P.M., Wondracek, G., Kruegel, C., Kirda, E.: Prospex: Protocol specification extraction. In: IEEE Symposium on Security and Privacy, pp. 110-125 (2009)
Dowd, M., McDonald, J., Schuh, J.: The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, Reading (2006)
Drewry, W., Ormandy, T.: Flayer: exposing application internals. In: WOOT 2007: Proceedings of the first USENIX workshop on Offensive Technologies, Berkeley, USA, pp. 1-9. USENIX Association (2007)
Driessens, K., Ramon, J., Gärtner, T.: Graph kernels and gaussian processes for relational reinforcement learning. Mach. Learn. 64(1-3), 91-119 (2006)
Godefroid, P., Kiézun, A., Levin, M.Y.: Grammar-based Whitebox Fuzzing. In: PLDI 2008: ACM SIGPLAN 2008 Conference on Programming Language Design and Implementation, Tucson, US (2008)
Hsu, Y., Shu, G., Lee, D.: A model-based approach to security flaw detection of network protocol implementations. In: IEEE International Conference on Network Protocols, ICNP 2008, October 2008, pp. 114-123 (2008)
Kaelbling, L.P., Littman, M.L., Moore, A.W.: Reinforcement learning: A survey. Journal of Artificial Intelligence Research 4, 237-285 (1996)
Karpilovsky, E., Gerber, A., Pei, D., Rexford, J., Shaikh, A.: Quantifying the extent of ipv6 deployment. In: Moon, S.B., Teixeira, R., Uhlig, S. (eds.) PAM 2009. LNCS, vol.5448, pp. 13-22. Springer, Heidelberg (2009)
Lee, D., Chen, D., Hao, R., Miller, R.E., Wu, J., Yin, X.: Network protocol system monitoring: a formal approach with passive testing. IEEE/ACM Trans. Netw. 14(2), 424-437 (2006)
Majumdar, R., Xu, R.-G.: Directed test generation using symbolic grammars. In: ESEC-FSE companion 2007: The 6th Joint Meeting on European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pp. 553-556. ACM, New York (2007)
Miller, B.P., Fredriksen, L., So, B.: An empirical study of the reliability of unix utilities. Commun. ACM 33(12), 32-44 (1990)
Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor Discovery for IP version 6 (IPv6). RFC 4861, Draft Standard (September 2007)
Newsome, J., Brumley, D., Song, D.X.: Vulnerability-specific execution filtering for exploit prevention on commodity software. In: NDSS (2006)
Sparks, S., Embleton, S., Cunningham, R., Zou, C.: Automated vulnerability analysis: Leveraging control flow for evolutionary input crafting. In: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, December 2007, pp. 477-486 (2007)
Vuagnoux, M.: Autodaf́e: an Act of Software Torture. In: Proceedings of the 22th Chaos Communication Congress, Berlin, pp. 47-58. Chaos Computer Club (2005)
Wang, Z., Yin, X., Wang, H., Wu, J.: Automatic testing of neighbor discovery protocol based on fsm and ttcn. In: The 2004 Joint Conference of the 10th Asia- Pacific Conference on Communications and the 5th International Symposium on Multi-Dimensional Mobile Communications Proceedings, Bejing, China, vol.2, pp. 805-809. IEEE Computer Society Press, Los Alamitos (2004)
Zhang, Y., Li, Z.: Ipv6 conformance testing: Theory and practice. In: ITC 2004: Proceedings of the International Test Conference on International Test Conference, Washington, DC, USA, pp. 719-727. IEEE Computer Society Press, Los Alamitos (2004) (Pubitemid 40610074)