Zobrazeno 1 - 10
of 107
pro vyhledávání: '"Weizhong Qiang"'
Publikováno v:
网络与信息安全学报, Vol 10, Pp 1-21 (2024)
Fuzzing is a technique that was used to detect potential vulnerabilities and errors in software or systems by generating random, abnormal, or invalid test cases.When applying fuzzing to the kernel, more complex and challenging obstacles were encounte
Externí odkaz:
https://doaj.org/article/730d8350f067411495289e8281b436d2
Publikováno v:
网络与信息安全学报, Vol 9, Pp 86-101 (2023)
In recent years, software vulnerabilities have been causing a multitude of security incidents, and the early discovery and patching of vulnerabilities can effectively reduce losses.Traditional rule-based vulnerability detection methods, relying upon
Externí odkaz:
https://doaj.org/article/1cc64d1112ee430b8d54847700c8fb37
Publikováno v:
网络与信息安全学报, Vol 6, Pp 35-44 (2020)
The features extracted by existing malicious Android application detection methods are redundant and too abstract to reflect the behavior patterns of malicious applications in high-level semantics.In order to solve this problem,an interpretable detec
Externí odkaz:
https://doaj.org/article/f724fc1627c94bb5b0b57a383bffa613
Publikováno v:
Applied Sciences, Vol 12, Iss 20, p 10586 (2022)
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data shar
Externí odkaz:
https://doaj.org/article/da1e640f681e4e5f9661b8d4a8e81086
Publikováno v:
网络与信息安全学报, Vol 5, Pp 67-74 (2019)
The demand of cyberspace security promotes the development of cyberspace security,and the core task of the development of cyberspace security is to train high-quality professionals.In view of the problems existing in the current training of cyberspac
Externí odkaz:
https://doaj.org/article/de38947258b4456ebd2ebd1adea346e7
Publikováno v:
IEEE Access, Vol 7, Pp 45961-45977 (2019)
Highly efficient languages, such as C/C++, have low-level control over memory. Due to the lack of validity detection for pointers and garbage collection for memory, developers are responsible for dynamic memory management by explicitly allocating and
Externí odkaz:
https://doaj.org/article/61ccc247e6cd47b7a5a69b9a559e4227
Publikováno v:
网络与信息安全学报, Vol 4, Pp 26-35 (2018)
Cloud computing is the mainstream information system technology,however,privacy protection of user and privacy violation tracking and forensics in the cloud computing environment have always been a challenge.The current mainstream cloud computing for
Externí odkaz:
https://doaj.org/article/63469d60d0094cedae312256fb5cbd37
Publikováno v:
IEEE Access, Vol 6, Pp 46584-46594 (2018)
Kernels of operating systems are written in low-level unsafe languages, which make them inevitably vulnerable to memory corruption attacks. Most existing kernel defense mechanisms focus on preventing control-data attacks. Recently, attackers have tur
Externí odkaz:
https://doaj.org/article/e36c825e97664c56bc4d96cc5f274c16
Publikováno v:
IEEE Access, Vol 5, Pp 21962-21976 (2017)
IoT generates considerable amounts of data, which often requires leveraging cloud computing to effectively scale the costs of transferring and computing these data. The concern regarding cloud security is more severe because many devices are connecte
Externí odkaz:
https://doaj.org/article/a30b97afc6b24e319f2d87ddbab3c836
Publikováno v:
IEEE Access, Vol 5, Pp 20777-20784 (2017)
During the lifecycle of a software system, software patches are committed to software repositories to fix discovered bugs or append new features. Unfortunately, the patches may bring new bugs or vulnerabilities, which could break the stability and se
Externí odkaz:
https://doaj.org/article/c8ebc1843c3e420cac29ba3bb8d18890