نتایج جستجو برای: vulnerability detection
تعداد نتایج: 606748 فیلتر نتایج به سال:
Aiming at the problem of insufficient technology for detecting smart contract vulnerabilities and lack improvement certain detection tools, a method expansion internal module Mythril is proposed. Since not yet mature there are in contracts, vulnerability particularly important. tool covers most types vulnerabilities, its accuracy rate also highest. In order to ensure effect detection, this pape...
Network Intrusion Detection Systems (NIDS) play a fundamental role on security policy deployment and help organizations in protecting their assets from network attacks. Signature-based NIDS rely on a set of known patterns to match malicious traffic. Accordingly, they are unable to detect a specific attack until a specific signature for the corresponding vulnerability is created, tested, release...
The conventional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key issues such as Java scripting and SQL injection. It causes tremendous business loss and customers risk due to taint distribution and illegal data manipulation. This paper introduces semantic analysis by using m...
The popularity of content management software (CMS) is growing vastly to the web developers and the business people because of its capacity for easy accessibility, manageability and usability of the distributed website contents. As per the statistics of Built with, 32% of the web applications are developed with WordPress(WP) among all other CMSs [1]. It is obvious that quite a good number of we...
Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnera...
With continuous scaling down of the semiconductor technology, the soft errors induced by energetic particles have become an increasing challenge in designing current and next-generation reliable microprocessors. Due to their large share of the transistor budget and die area, cache memories suffer from an increasing vulnerability against soft errors. Previous work based on the vulnerability fact...
-Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtain good accuracy a relevant or efficient dataset should be there to detect the known attacks and unknown attacks. Therefore, there are numerous security systems and intrusion dete...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید