SSL/TLS Vulnerability Detection Using Black Box Approach
نویسندگان
چکیده
منابع مشابه
Using Invariant Detection Mechanism in Black Box Inference
The testing and formal verification of black box software components is a challenging domain. The problem is even harder when specifications of these components are not available. An approach to cope with this problem is to combine testing with learning techniques, such that the learned models of the components can be used to explore unknown implementation and thus facilitate testing efforts. I...
متن کاملUsing Nonlinear Black-box Models in Fault Detection and Isolation
A method for fault detection is proposed using nonlinear black-box models, such as polynomial regression and neural networks. Compared to existing methods, this proposed method has the advantage of not requiring model training under all the possible faulty modes of the monitored system. Partial physical knowledge , if available, can be combined with the nonlinear black-box model to perform faul...
متن کاملPothole Detection System Using a Black-box Camera
Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies...
متن کاملDistributed Black-Box Software Testing Using Negative Selection
In the software development process, testing is one of the most human intensive steps. Many researchers try to automate test case generation to reduce the manual labor of this step. Negative selection is a famous algorithm in the field of Artificial Immune System (AIS) and many different applications has been developed using its idea. In this paper we have designed a new algorithm based on nega...
متن کاملSoftware Coverage Analysis: Black Box Approach Using ANT System
Requirements of the desired software product can be translated into state transition diagram or other UML diagrams. To verify the complete coverage of software requirements, the proposed Ant based approach generates non-repetitive transitions from the input state diagram. This approach has less redundant transitions and also gives uncovered transition in successive paths instead of giving whole...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2018
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/978/1/012121