نتایج جستجو برای: protocol fuzzing
تعداد نتایج: 250258 فیلتر نتایج به سال:
With the commercialization of 5G mobile phones, Android drivers are increasing rapidly to utilize a large quantity newly emerging feature-rich hardware. Most these developed by third-party vendors and lack proper vulnerabilities review, posing number new potential risks security privacy. However, complexity diversity make traditional analysis methods inefficient. For example, driver-specific ar...
Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS reported has increased annually for the past three years, posing a considerable challenge application maintainers. Black-box scanners mainstream tools security engineers perform penetration testing and detect vulnerabilities. Unfortunately, black-box rely on crawlers find input points appli...
Remote Procedure Call (RPC) is a communication protocol to support client-server interactions among services over network. RPC widely applied in industry for building large-scale distributed systems, such as Microservices. Modern frameworks include example Thrift, gRPC, SOFARPC and Dubbo. Testing systems using communications very challenging, due the complexity of various system could employ. T...
Control Flow Graphs (CFGs) provide fundamental data for many program analyses, such as malware analysis, vulnerability detection, code similarity etc. Existing techniques constructing control flow graphs include static, dynamic, and hybrid which each having their own advantages disadvantages. However, due to the difficulty of resolving indirect jump relations, existing are limited in completene...
We present WasmRef-Isabelle, a monadic interpreter for WebAssembly written in Isabelle/HOL and proven correct with respect to the WasmCert-Isabelle mechanisation of WebAssembly. WasmRef-Isabelle has been adopted deployed as fuzzing oracle continuous integration infrastructure Wasmtime, widely used implementation. Previous efforts fuzz Wasmtime against WebAssembly's official OCaml reference were...
Increased focus on the Universal Serial Bus (USB) attack surface of devices has recently resulted in a number of new vulnerabilities. Much of this advance has been aided by the advent of hardware-based USB emulation techniques. However, existing tools and methods are far from ideal, requiring a significant investment of time, money, and effort. In this work, we present a USB testing framework t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید