نتایج جستجو برای: protocol fuzzing
تعداد نتایج: 250258 فیلتر نتایج به سال:
A decay width calculation for a hybrid exotic meson h, with J = 1, is presented for the channel h → πa1. This quenched lattice QCD simulation employs Lüscher’s finite box method. Operators coupling to the h and πa1 states are used at various levels of smearing and fuzzing, and at four quark masses. Eigenvalues of the corresponding correlation matrices yield energy spectra that determine scatter...
With the emergence of networked devices, from Internet Things (IoT) nodes and cellular phones to vehicles connected Internet, there has been an ever-growing expansion attack surfaces in Vehicles (IoV). In past decade, a rapid growth automotive industry as network-enabled electronic devices are now integral parts vehicular ecosystems. These include development automobile technologies, namely, Co...
Antivirus solutions are now a common component of computer systems. However, security issues pertaining to the antivirus software itself have not captured enough attentions of antivirus vendors and computer users. This paper discusses why antivirus software is vulnerable to various attacks and why its security is so critical. It examines the tools and techniques, especially fuzzing techniques, ...
State machine learning is a useful technique for automating reverse engineering. In essence, it involves fuzzing different sequences of inputs for a system. We show that this technique can be successfully used to reverse engineer hand-held smartcard readers for Internet banking, by using a Lego robot to operate these devices. In particular, the state machines that are automatically inferred by ...
Abstract Network function virtualization provides programmable in-network middlewares by leveraging technologies and commodity hardware has gained popularity among all mainstream network device manufacturers. Yet it is challenging to apply coverage-guided fuzzing, one of the state-of-the-art vulnerability discovery approaches, those virtualized devices, due inevitable integrity protection adopt...
Abstract Worst-case resource usage provides a useful guidance in the design, configuration and deployment of software, especially when it runs under context with limited amount resources. Static resource-bound analysis can provide sound upper bounds worst-case but may too conservative, even unbounded, results. In this paper, we present resource-usage-aware fuzzing approach to estimate usage. Th...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید