Formation principle
Mining target systems
generative process
Basic architecture information
Black box genetic algorithm
More targeted
knowledge-based system
web application
Web vulnerabilities
As initial test data
Combining the target system
Dependency testers
Heuristic test data generation
Principle of vulnerability formation