2018
DOI: 10.1109/msp.2018.1870858
|View full text |Cite
|
Sign up to set email alerts
|

Mechanical Phish: Resilient Autonomous Hacking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 6 publications
0
10
0
Order By: Relevance
“…We use the following comparison methods for evaluation:In the stage of AutoD, AFL [13] , AFLFast [29] , AFLGo [30] , Driller [11] and Anti-Driller (described in Algorithm 2) are used.In the stage of AutoE, Rex [7] , IPOV fuzzer (described in Algorithm 3), AutoJS (described in Algorithm 4) and AutoROP (described in Algorithm 5) are used.In the stage of AutoS, RR [38] and AutoS (described in Algorithm 6) are used.…”
Section: Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…We use the following comparison methods for evaluation:In the stage of AutoD, AFL [13] , AFLFast [29] , AFLGo [30] , Driller [11] and Anti-Driller (described in Algorithm 2) are used.In the stage of AutoE, Rex [7] , IPOV fuzzer (described in Algorithm 3), AutoJS (described in Algorithm 4) and AutoROP (described in Algorithm 5) are used.In the stage of AutoS, RR [38] and AutoS (described in Algorithm 6) are used.…”
Section: Methodsmentioning
confidence: 99%
“…It further generates and verifies the exploits automatically. Shoshitaishvili et al [7] propose Rex and use it for CGC challenges.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations