[1] Case J, Fedor M, Schoffstall M, et al. RFC 1157: Simple Network Management Protocol (SNMP) [S]. California: IETF, 1990.
[2] Oulu University Secure Programming Group. PROTOS Test-suite: c06-snmpv1 [CP/OL]. [2014-02-21]. https://www.ee.oulu.fi/resear ch/ouspg/PROTOS_Test-Suite_c06-snmpv1.
[3] Liu Q, Zhang Y. TFTP Vulnerability Finding Technique Based on Fuzzing [J]. Computer Communications, 2008, 31(14): 3420-3426.
[4] 王颖, 杨义先, 钮心忻, 等. 基于控制流序位比对的智能Fuzzing测试方法 [J]. 通信学报, 2013, 34(4): 114-121.
Wang Ying, Yang Yixian, Niu Xinxin, et al. Smart Fuzzing Method Based on Comparison Algorithm of Control Flow Sequences [J]. Journal on Communications, 2013, 34(4): 114-121.
[5] 张宝峰, 张翀斌, 许源. 基于模糊测试的网络协议漏洞挖掘 [J]. 清华大学学报(自然科学版), 2009, 49(S2): 2113-2118.
Zhang Baofeng, Zhang Chongbin, Xu Yuan. Network Protocol Vulnerability Discovery Based on Fuzzy Testing [J]. Journal of Tsinghua University (Science and Technology), 2009, 49(S2): 2113-2118.
[6] Shapiro R, Bratus S, Rogers E, et al. Critical Infrastructure Protection V [M]. Berlin: Springer, 2011: 57-72.
[7] Wang Z, Zhang Y, Liu Q. RPFuzzer: a Framework for Discovering Router Protocols Vulnerabilities Based on Fuzzing [J]. KSII Transactions on Internet & Information Systems, 2013, 7(8): 1989-2009.
[8] Waldbusser S, Rose M, Case J, et al. Structure of Management Information for Version 2 of the Simple Network Management Protocol (SNMPv2) [S]. California: IETF, 1993.
[9] Mundy R, Partain D, Stewart B. Introduction to Version 3 of the Internet-standard Network Management Framework [S]. California: IETF, 1999.
[10] Miller C, Peterson Z. Analysis of Mutation and Generation-based Fuzzing [R]. Independent Security Evaluators, 2007.
[11] Wu Z, Atwood J, Zhu X. A New Fuzzing Technique for Software Vulnerability Mining [C]//Proceedings of International Conference on Software Engineering. Mumbai: Computer Society of India, 2009: 59-66.
[12] ITU-T. ASN.1 Project[EB/OL]. [2014-02-21]. http://www.itu.int/ITU-T/asn1/.
[13] NIST. National Vulnerability Database [EB/OL]. [2014-02-21]. http://nvd.nist.gov.
[14] 中国信息安全测评中心. 中国国家信息安全漏洞库 [EB/OL]. [2014-02-21]. http://www.cnnvd.org.cn.
[15] Ortega A, Muniz S. Dynamips-mod [CP/OL]. [2014-02-21]. http://www.groundworkstech.com/projects-dynam ips-gdb-mod.html.
[16] Yuschuk O. OllyDBG [CP/OL]. [2014-02-21]. http://www.ollydbg.de.
[17] The Wireshark Community. Wireshark [CP/OL]. [2014-02-21]. http://www.wireshark.org.
[18] Cola. Colasoft Capsa Enterprise 7.2.1 [CP/OL]. [2014-02-21]. http://www.colasoft.com.cn.
[19] Science Dissemination Unit. Response Time and Packet loss. [EB/OL]. [2014-02-21]. http://sdu.ictp.it/pinger/pinger.html.
[20] The Penetration Test Team of NCNIPC. Wireshark Malformed SNMPv1 Packet Remote Denial of Service Vulnerability. [EB/OL]. [2014-02-21]. http://www.securityfocus.com/bid/43197.
[21] Rypl L. SNMP-fuzzer(LukasRypl). [CP/OL]. [2014-02-21]. https://github.com/LukasRypl/snmp-fuzzer.
[22] Arhont. SNMP-fuzzer-0.1.1. [CP/OL]. [2014-02-21]. http://www.pentoo.ch/distfiles/snmp-fuzzer-0.1.1.tar.gz. |