نتایج جستجو برای: protocol fuzzing

تعداد نتایج: 250258  

2006
H. R. Fiebig

A decay width calculation for a hybrid exotic meson h, with J = 1, is presented for the channel h → πa1. This quenched lattice QCD simulation employs Lüscher’s finite box method. Operators coupling to the h and πa1 states are used at various levels of smearing and fuzzing, and at four quark masses. Eigenvalues of the corresponding correlation matrices yield energy spectra that determine scatter...

Journal: :Journal of Sensor and Actuator Networks 2022

With the emergence of networked devices, from Internet Things (IoT) nodes and cellular phones to vehicles connected Internet, there has been an ever-growing expansion attack surfaces in Vehicles (IoV). In past decade, a rapid growth automotive industry as network-enabled electronic devices are now integral parts vehicular ecosystems. These include development automobile technologies, namely, Co...

Journal: :Journal of the Textile Machinary Society 1964

2008
Feng Xue

Antivirus solutions are now a common component of computer systems. However, security issues pertaining to the antivirus software itself have not captured enough attentions of antivirus vendors and computer users. This paper discusses why antivirus software is vulnerable to various attacks and why its security is so critical. It examines the tools and techniques, especially fuzzing techniques, ...

2014
Georg Chalupar Stefan Peherstorfer Erik Poll Joeri de Ruiter

State machine learning is a useful technique for automating reverse engineering. In essence, it involves fuzzing different sequences of inputs for a system. We show that this technique can be successfully used to reverse engineer hand-held smartcard readers for Internet banking, by using a Lego robot to operate these devices. In particular, the state machines that are automatically inferred by ...

Journal: :Cybersecurity 2022

Abstract Network function virtualization provides programmable in-network middlewares by leveraging technologies and commodity hardware has gained popularity among all mainstream network device manufacturers. Yet it is challenging to apply coverage-guided fuzzing, one of the state-of-the-art vulnerability discovery approaches, those virtualized devices, due inevitable integrity protection adopt...

Journal: :Lecture Notes in Computer Science 2022

Abstract Worst-case resource usage provides a useful guidance in the design, configuration and deployment of software, especially when it runs under context with limited amount resources. Static resource-bound analysis can provide sound upper bounds worst-case but may too conservative, even unbounded, results. In this paper, we present resource-usage-aware fuzzing approach to estimate usage. Th...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید