Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Xinglu He"'
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 10182 (2022)
Symbolic execution is well known as a dynamic vulnerability discovery technique. Its greatest advantage is the capability to analyze the execution information of the program and to explore the path in the program deterministically. This is a more acc
Externí odkaz:
https://doaj.org/article/5c0b0ddbda374024bfcbcf4b8093601e
Publikováno v:
Applied Sciences, Vol 12, Iss 19, p 9782 (2022)
In recent years, coverage-guided technology has become the mainstream method of fuzzing. A coverage-guided fuzzer can guide a program to a new path (edge) so that previously untested code can be tested. As coverage-guided fuzzers have become more pop
Externí odkaz:
https://doaj.org/article/ed2f2a816d374979b1b4b1d117a7a278
Publikováno v:
Trustcom/BigDataSE/ISPA
Privacy leak is becoming a serious problem for every computer user. It will be a threat to user accounts, passwords and private documents. Privacy leak detection has been an important research point in security research community. Current privacy lea