نتایج جستجو برای: vulnerability detection

تعداد نتایج: 606748  

Journal: :Journal of Physics: Conference Series 2018

Journal: :Applied sciences 2023

Aiming at the problem of insufficient technology for detecting smart contract vulnerabilities and lack improvement certain detection tools, a method expansion internal module Mythril is proposed. Since not yet mature there are in contracts, vulnerability particularly important. tool covers most types vulnerabilities, its accuracy rate also highest. In order to ensure effect detection, this pape...

Journal: :Computers & Security 2011
Hugo Gascon Agustín Orfila Jorge Blasco Alís

Network Intrusion Detection Systems (NIDS) play a fundamental role on security policy deployment and help organizations in protecting their assets from network attacks. Signature-based NIDS rely on a set of known patterns to match malicious traffic. Accordingly, they are unable to detect a specific attack until a specific signature for the corresponding vulnerability is created, tested, release...

2010
Raymond Wu Masayuki Hisada Atsushi Kara Takafumi Hayashi

Journal: :Journal of Object Technology 2010
Raymond Wu Masayuki Hisada

The conventional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key issues such as Java scripting and SQL injection. It causes tremendous business loss and customers risk due to taint distribution and illegal data manipulation. This paper introduces semantic analysis by using m...

Journal: :CoRR 2017
Md. Maruf Hassan Kaushik Sarker Saikat Biswas Md. Hasan Sharif

The popularity of content management software (CMS) is growing vastly to the web developers and the business people because of its capacity for easy accessibility, manageability and usability of the distributed website contents. As per the statistics of Built with, 32% of the web applications are developed with WordPress(WP) among all other CMSs [1]. It is obvious that quite a good number of we...

2014
Shruthi S

Cloud security is one of most important issues that has attracted a lot of research and development effort in past few years. Particularly, attackers can explore vulnerabilities of a cloud system and compromise virtual machines to deploy further large-scale Distributed Denialof-Service(DDoS). DDoS attacks usually involve early stage actions such as multi-step exploitation, low frequency vulnera...

Journal: :Microprocessors and Microsystems - Embedded Hardware Design 2015
Shuai Wang Guangshan Duan

With continuous scaling down of the semiconductor technology, the soft errors induced by energetic particles have become an increasing challenge in designing current and next-generation reliable microprocessors. Due to their large share of the transistor budget and die area, cache memories suffer from an increasing vulnerability against soft errors. Previous work based on the vulnerability fact...

2013
Awan Dhawan

-Intrusion detection system must be capable of known and unknown vulnerabilities. We already studied the previous problems which includes detection of known vulnerabilities and unknown vulnerabilities. In order to obtain good accuracy a relevant or efficient dataset should be there to detect the known attacks and unknown attacks. Therefore, there are numerous security systems and intrusion dete...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید