نتایج جستجو برای: protocol fuzzing

تعداد نتایج: 250258  

Journal: :ACM Transactions on Software Engineering and Methodology 2023

JavaScript is one of the most popular programming languages. However, its dynamic nature poses several challenges to automated testing techniques. In this paper, we propose an approach and open-source tool support enable white-box applications using Search-Based Software Testing (SBST) We provide collect search-based heuristics like common Branch Distance Testability Transformations . To empiri...

Journal: :JSW 2012
Guoxiang Yao Quanlong Guan Kaibin Ni

The number of Web controls’ security vulnerability surged with ever-changing varieties of attacks. Therefore this paper analyzes test model for Web controls’ vulnerability, and put forward a improved test model for Web controls’ vulnerability. Be aimed to test vulnerability of Web ActiveX controls combining static analysis and dynamic analysis, as well as put forward a proposal of optimizing th...

2009
Michael Hartle Andreas Fuchs Marcus Ständer Daniel Schumann Max Mühlhäuser

Data formats play a central role in information processing, exchange and storage. Security-related tasks such as the documentation of exploits or format-aware fuzzing of files depend on formalized data format knowledge. In this article, we present a model for describing arbitrary data format instances as well as arbitrary data formats as a whole. Using the Bitstream Segment Graph (BSG) model an...

Journal: :IEEE Transactions on Network and Service Management 2020

Journal: :ACM Transactions on Software Engineering and Methodology 2023

As an essential component responsible for communication, network services are security-critical, and it is vital to find vulnerabilities in them. Fuzzing currently one of the most popular software vulnerability discovery techniques, widely adopted due its high efficiency low false positives. However, existing coverage-guided fuzzers mainly aim at stateless local applications, leaving stateful u...

Journal: :Informatsionno-upravliaiushchie sistemy 2022

Introduction: The standard way to check the quality of a compiler is manual testing. However, it does not allow cover vast diversity programs that can be written in target programming language. Today, addition tests there are many automated testing methods, among which fuzzing one most powerful and useful. A fuzzer tool generates random program language checks how works this Purpose: To develop...

Journal: :IEEE Transactions on Dependable and Secure Computing 2023

Memory corruption vulnerabilities remain a prevalent threat on low-cost bare-metal devices. Fuzzing is popular technique for automatically discovering such vulnerabilities. However, devices lack even basic security mechanisms as Management Unit. Consequently, fuzzing approaches encounter silent memory corruptions with no visible effects, making discovery difficult. Once discovered, it also esse...

Journal: :IEEE Internet of Things Journal 2021

With a growing number of embedded devices that create, transform, and send data autonomously at its core, the Internet Things (IoT) is reality in different sectors, such as manufacturing, healthcare, or transportation. this expansion, IoT becoming more present critical environments, where security paramount. Infamous attacks, Mirai, have shown insecurity power IoT, well potential large-scale at...

Journal: :International Journal of Distributed Sensor Networks 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید