[1] |
FREIER A, KARTON P, KOCHER P . The Secure Sockets Layer (SSL) Protocol Version 3.0: RFC 6101 [S/OL]. [ 2019-02-25]. https://tools.ietf.org/html/rfc6101
|
[2] |
DIERKS T, RESCORLA E . The Transport Layer Security (TLS) Protocol Version 1.2: RFC 5246 [S/OL]. [ 2019-02-25]. https://tools.ietf.org/html/rfc5246
|
[3] |
Information Technology Laboratory. National Vulnerabilty Database CVE-2016-8495 Details [EB/OL]. [2019-02-20]. https://nvd.nist.gov/vuln/detail/CVE-2016-8495
|
[4] |
BRUBAKER C, JANA S, RAY B , et al. Using Frankencerts for Automated Adversarial Testing of Certificate Validation in SSL/TLS Implementations [C]//Proceedings of the 2014 IEEE Symposium on Security and Privacy. Washington:IEEE Computer Society, 2014: 114-129.
|
[5] |
CHEN Y T, SU Z D . Guided Differential Testing of Certificate Validation in SSL/TLS Implementations [C]// Proceedings of the 2015 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York: ACM, 2015: 793-804.
|
[6] |
CHAU S Y, CHOWDHURY O, HOQUE E , et al. SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations [C]//Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 503-520.
|
[7] |
PETSIOS T, TANG A, STOLFO S , et al. NEZHA: Efficient Domain-independent Differential Testing [C]// Proceedings of the 2017 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2017: 615-632.
|
[8] |
COOPER D, SANTESSON S, FARRELL S , et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile: RFC 5280 [S/OL]. [2019-02-25]. https://tools.ietf.org/html/rfc5280
|
[9] |
BRADNER S . Key Words for Use in RFCs to Indicate Requirement Levels: RFC 2119[S/OL]. [ 2019-02-25]. https://tools.ietf.org/html/rfc2119
|
[10] |
LEIBA B . Ambiguity of Uppercase vs Lowercase in RFC 2119: RFC 8174 [S/OL]. [2019-02-20]. https://tools.ietf.org/html/rfc8174
|
[11] |
BALDONI R, COPPA E, D’ELIA D C et al. A Survey of Symbolic Execution Techniques[J]. ACM Computing Surveys, 2018,51(3): 50:1-50:39.
|
[12] |
MCKEEMAN W M . Differential Testing for Software[J]. Digital Technical Journal, 1998,10(1):100-107.
|
[13] |
EVANS R B, SAVOIA A . Differential Testing: a New Approach to Change Detection [C]// Proceedings of the 2007 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. New York: ACM, 2007: 549-552.
|
[14] |
CHEN Y T, SU T, SUN C N , et al. Coverage-directed Differential Testing of JVM Implementations [C]// Proceedings of the 2016 ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2016: 85-99.
|
[15] |
YEE P . Updates to the Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile: RFC 6818 [S/OL]. [ 2019-02-25]. https://tools.ietf.org/html/rfc6818
|
[16] |
CADAR C, DUNBAR D, ENGLER D R . KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs [C]//Proceedings of the 2008 8th USENIX Conference on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2008: 209-224.
|
[17] |
CHEN C, TIAN C, DUAN Z H , et al. RFC-directed Differential Testing of Certificate Validation in SSL/TLS Implementations [C]//Proceedings of the 2018 International Conference on Software Engineering. New York: ACM, 2018: 859-870.
|