Zobrazeno 1 - 10
of 412
pro vyhledávání: '"vulnerability discovery"'
Publikováno v:
网络与信息安全学报, Vol 10, Pp 156-168 (2024)
With the widespread development of fifth-generation (5G) mobile communication technology, concerns regarding 5G network security have also increased.Blackbox fuzzing is a commonly used method for automated vulnerability discovery in software security
Externí odkaz:
https://doaj.org/article/70a9378202814f92aea75dcf185b8b8d
Publikováno v:
IEEE Access, Vol 12, Pp 14437-14454 (2024)
Fuzz testing is a vulnerability discovery technique that tests the robustness of target programs by providing them with unconventional data. With the rapid increase in software quantity, scale and complexity, traditional fuzzing has revealed issues s
Externí odkaz:
https://doaj.org/article/20e0962fb70e4bdcb46167cfd8bb9617
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)
Abstract The popularity of small office and home office routers has brought convenience, but it also caused many security issues due to vulnerabilities. Black-box fuzzing through network protocols to discover vulnerabilities becomes a viable option.
Externí odkaz:
https://doaj.org/article/2ed916ca7873445ca320305251743af9
Publikováno v:
Cybersecurity, Vol 6, Iss 1, Pp 1-21 (2023)
Abstract Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness. Mutation-based greybox fu
Externí odkaz:
https://doaj.org/article/3d707a6e7739485cbc5cc724be9c6610
Publikováno v:
Mathematics, Vol 12, Iss 10, p 1447 (2024)
Aiming at the problem that the search efficiency of key vulnerable nodes in large-scale networks is not high and the consideration factors are not comprehensive enough, in order to improve the time and space efficiency of search and the accuracy of r
Externí odkaz:
https://doaj.org/article/1fffbc22422a447b8354190472ee6b74
Publikováno v:
Applied Sciences, Vol 14, Iss 6, p 2373 (2024)
As the Internet of Things (IoT) era arrives, the proliferation of IoT devices exposed to the Internet presents a significant challenge to device security. Firmware is software that operates within Internet of Things (IoT) devices, directly governing
Externí odkaz:
https://doaj.org/article/69ebdd86fc684d12bf1006bc9e2daa6c
Autor:
Schulz, Charles-H, author
Publikováno v:
Open Source Law, Policy and Practice, 2022.
Externí odkaz:
https://doi.org/10.1093/oso/9780198862345.003.0013
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Jisuanji kexue, Vol 48, Iss 12, Pp 85-93 (2021)
Fuzzing test is an important method to exploit network protocol vulnerability.Existing fuzzing test methods have some problems such as incomplete path coverage and low efficiency.To solve these problems,this paper proposes a depth-first search based
Externí odkaz:
https://doaj.org/article/6ba3991a3f914e9581dfb0408f4e70fd
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.