Zobrazeno 1 - 10
of 8 574
pro vyhledávání: '"Control flow"'
Publikováno v:
IEEE Access, Vol 12, Pp 169370-169378 (2024)
The American Fuzzy Lop (AFL) is a tool that automatically generates random data to expose vulnerabilities in software programs. However, it has some drawbacks, such as the lack of visibility in test case generation and suboptimal allocation of test c
Externí odkaz:
https://doaj.org/article/b7fa9fc2ca994c8f97f5134af7463f74
Memory corruption attacks have existed in C and C++ for more than 30 years, and over the years many defenses have been proposed. In addition to that, a new class of attacks, Spectre, has emerged that abuse speculative execution to leak secrets and se
Externí odkaz:
https://hdl.handle.net/10919/119211
Publikováno v:
PeerJ Computer Science, Vol 10, p e2094 (2024)
Business process simulation is an established approach to estimate the potential impact of hypothetical changes on a process, particularly in terms of time and cost-related performance measures. To overcome the complexity associated with manually spe
Externí odkaz:
https://doaj.org/article/38325ea5104f447d81db1bdfb81d90ea
Publikováno v:
网络与信息安全学报, Vol 9, Pp 48-58 (2023)
With the increasing complexity of software functions and the evolving technologies of network attacks, malicious behaviors such as software piracy, software cracking, data leakage, and malicious software modification are on the rise.As a result, soft
Externí odkaz:
https://doaj.org/article/f137f4040a874c93822d95d6ca6dcb51
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-16 (2023)
Abstract Buffer overflow poses a serious threat to the memory security of modern operating systems. It overwrites the contents of other memory areas by breaking through the buffer capacity limit, destroys the system execution environment, and provide
Externí odkaz:
https://doaj.org/article/728eb449f62747f7af59086ad39668e4
Publikováno v:
Journal of Marine Science and Engineering, Vol 12, Iss 8, p 1345 (2024)
Intelligent pipeline inspection is necessary to operate submarine pipelines safely. At present, speed excursion and blockage are the challenges in the inspection of low-pressure gas pipelines. Accordingly, this study proposes a novel pneumo-electric
Externí odkaz:
https://doaj.org/article/c19f5987b96741aa9dc8e0a88b41e492
Publikováno v:
Entropy, Vol 26, Iss 8, p 622 (2024)
When describing Active Inference Agents (AIAs), the term “energy” can have two distinct meanings. One is the energy that is utilized by the AIA (e.g., electrical energy or chemical energy). The second meaning is so-called Variational Free Energy
Externí odkaz:
https://doaj.org/article/a8dec133f3e74bffae3761bb448fe9d8
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 3, Iss 3, Pp 351-363 (2023)
The control flow of a program represents valuable and sensitive information; in embedded systems, this information can take on even greater value as the resources, control flow, and execution of the system have more constraints and functional implica
Externí odkaz:
https://doaj.org/article/e7eaf1b4442f4efe91e446996c1005d9
Autor:
Sukaina Izzat, Nada N. Saleem
Publikováno v:
مجلة التربية والعلم, Vol 32, Iss 2, Pp 30-44 (2023)
The software development process is closely related to the creation and evaluation processes. The problem with this software development is that it often lacks testing which leads to software failures. In order To maintain a high quality product in e
Externí odkaz:
https://doaj.org/article/4863071aae2c4637a5c71ae6ac7bf01f
Autor:
Moon Chan Park, Dong Hoon Lee
Publikováno v:
IEEE Access, Vol 11, Pp 4291-4305 (2023)
Control-flow integrity (CFI) is considered a principled mitigation against control-flow hijacking even under the most powerful attacker who can arbitrarily write and read memory. However, existing schemes still demonstrated limitations in either guar
Externí odkaz:
https://doaj.org/article/e4e65d5f3cc248ecb0e529282322af8c