UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching
نویسندگان
چکیده
منابع مشابه
An Efficient Nearest Neighbor Searching Method
Conservative spatial queries, such as range search and nearest neighbor reclamation, involves only conditions on objects’ numerical properties. Today, many modern applications call for novel forms of queries that aim to find objects satisfying both a spatial predicate, and a predicate on their associated texts. For example, instead of considering all the restaurants, a nearest neighbor query wo...
متن کاملH-Fuzzing: A New Heuristic Method for Fuzzing Data Generation
How to efficiently reduce the fuzzing data scale while assuring high fuzzing veracity and vulnerability coverage is a pivotal issue in program fuzz test. This paper proposes a new heuristic method for fuzzing data generation named with H-Fuzzing. H-Fuzzing achieves a high program execution path coverage by retrieving the static information and dynamic property from the program. Our experiments ...
متن کاملAn Efficient CPU Architecture for DSP Processors
Design narrative of an efficient CPU architecture dedicated to UTS-DSP (University of Tehran and Iran Communication Industries(SAMA) DSP) [1]-[10] is reported. Time and area consuming, the CPU architecture is a critical component of the overall architecture, which is responsible for execution of arithmetic and logical operations. The goal is composing an optimized hardware appropriate for execu...
متن کاملAn Efficient Method for Model Reduction in Diffuse Optical Tomography
We present an efficient method for the reduction of model equations in the linearized diffuse optical tomography (DOT) problem. We first implement the maximum a posteriori (MAP) estimator and Tikhonov regularization, which are based on applying preconditioners to linear perturbation equations. For model reduction, the precondition is split into two parts: the principal components are consid...
متن کاملEfficient Program Exploration by Input Fuzzing
One of the issues of a malware detection service is to update its database. For that, an analysis of new samples must be performed. Usually, one tries to replay the behavior of malware in a safe environment. But, a bot sample may activate a malicious function only if it receives some particular input from its command and control server. The game is to find inputs which activate all relevant bra...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2946444