咨询与建议

限定检索结果

文献类型

  • 11 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 19 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 19 篇 工学
    • 17 篇 计算机科学与技术...
    • 8 篇 信息与通信工程
    • 7 篇 电气工程
    • 6 篇 软件工程
    • 2 篇 电子科学与技术(可...
    • 2 篇 控制科学与工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 动力工程及工程热...
    • 1 篇 石油与天然气工程
    • 1 篇 环境科学与工程(可...
  • 3 篇 理学
    • 2 篇 数学
    • 1 篇 化学
    • 1 篇 生物学

主题

  • 19 篇 vulnerabilities ...
  • 6 篇 static analysis
  • 5 篇 deep learning
  • 4 篇 smart contracts
  • 3 篇 lstm
  • 3 篇 opcode sequences
  • 3 篇 smart contract
  • 2 篇 control flow gra...
  • 2 篇 machine learning
  • 1 篇 ethereum
  • 1 篇 uefi firmware
  • 1 篇 smart contract a...
  • 1 篇 android applicat...
  • 1 篇 blockchain smart...
  • 1 篇 component
  • 1 篇 webassembly
  • 1 篇 execution enviro...
  • 1 篇 gpt-3
  • 1 篇 formal analysis
  • 1 篇 memory safety

机构

  • 3 篇 guangzhou univ s...
  • 1 篇 stevens inst tec...
  • 1 篇 hebei key lab io...
  • 1 篇 hong kong polyte...
  • 1 篇 chinese acad sci...
  • 1 篇 key laboratory f...
  • 1 篇 hong kong polyte...
  • 1 篇 renmin univ chin...
  • 1 篇 inst polytech pa...
  • 1 篇 swansea univ com...
  • 1 篇 univ salerno fis...
  • 1 篇 russian acad sci...
  • 1 篇 china informat t...
  • 1 篇 school of comput...
  • 1 篇 univ sci & techn...
  • 1 篇 at&t labs res be...
  • 1 篇 xingtai univ mat...
  • 1 篇 univ abou bekr b...
  • 1 篇 beijing inst tec...
  • 1 篇 bayero univ kano...

作者

  • 3 篇 wang guojun
  • 3 篇 li peiqiang
  • 3 篇 zhu jinyao
  • 2 篇 xing xiaofei
  • 1 篇 koul nimrita
  • 1 篇 hua baojian
  • 1 篇 sharma seema
  • 1 篇 yang jingda
  • 1 篇 shi ning
  • 1 篇 zhai guangxin
  • 1 篇 cheng xiaochun
  • 1 篇 ait-ameur yamine
  • 1 篇 zulzalil hazura
  • 1 篇 hu jingyuan
  • 1 篇 zhang jiangxiao
  • 1 篇 zhang puhan
  • 1 篇 de oca edgardo m...
  • 1 篇 esposito christi...
  • 1 篇 shilov nikolay
  • 1 篇 mehrotra deepti

语言

  • 19 篇 英文
检索条件"主题词=Vulnerabilities Detection"
19 条 记 录,以下是1-10 订阅
排序:
Static vulnerabilities detection Based on Extended Vulnerability State Machine Model
Static Vulnerabilities Detection Based on Extended Vulnerabi...
收藏 引用
International Conference on Networks Security, Wireless Communications and Trusted Computing
作者: Liang, Bin Renmin Univ China Sch Informat Beijing 100872 Peoples R China
A static vulnerability detection method based on an extended vulnerability state machine is proposed in this paper. In this method, the state space of state machine model is extended. The security state of a variable ... 详细信息
来源: 评论
Opcode Sequences-Based Smart Contract vulnerabilities detection Using Deep Learning  22
Opcode Sequences-Based Smart Contract Vulnerabilities Detect...
收藏 引用
IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) / BigDataSE Conference / CSE Conference / EUC Conference / ISCI Conference
作者: Zhu, Jinyao Xing, Xiaofei Wang, Guojun Li, Peiqiang Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou 510006 Peoples R China
Ethereum is a blockchain platform that allows developers to create smart contracts. Smart contracts are programs that can automatically execute and handle cryptocurrency funds. However, over a hundred thousand new sma... 详细信息
来源: 评论
5G RRC Protocol and Stack vulnerabilities detection via Listen-and-Learn  20
5G RRC Protocol and Stack Vulnerabilities Detection via List...
收藏 引用
IEEE 20th Consumer Communications and Networking Conference (CCNC)
作者: Yang, Jingda Wang, Ying Tran, Tuyen X. Pan, Yanjun Stevens Inst Technol Hoboken NJ 07030 USA AT&T Labs Res Bedminster NJ USA Univ Arkansas Fayetteville AR 72701 USA
The paper proposes a protocol-independent Listen-and-Learn (LAL) based fuzzing system, which provides a systematic solution for vulnerabilities and unintended emergent behavior detection with sufficient automation and... 详细信息
来源: 评论
Security vulnerabilities detection Through Assertion-Based Approach  16th
Security Vulnerabilities Detection Through Assertion-Based A...
收藏 引用
16th International Symposium on Theoretical Aspects of Software Engineering (TASE)
作者: Ait-Ameur, Yamine Kissi, Salim Yahia Ameur-Boulifa, Rabea Seladji, Yassamin Univ Abou Bekr Belkaid Tlemcen LRIT Tilimsen Algeria Inst Polytech Paris Telecom ParisTech LTCI Palaiseau France
Organizations and companies develop very complex software today. Errors and flaws can be introduced at different phases of the software development life cycle and can lead to exploitable vulnerabilities. Furthermore, ... 详细信息
来源: 评论
Smart contract vulnerabilities detection with bidirectional encoder representations from transformers and control flow graph
收藏 引用
MULTIMEDIA SYSTEMS 2024年 第4期30卷 204-204页
作者: Su, Peng Hu, Jingyuan Univ Sci & Technol Beijing Sch Comp & Commun Engn Beijing Peoples R China Chinese Acad Sci Inst Informat Engn Beijing Peoples R China
Up to now, the smart contract vulnerabilities detection methods based on sequence modal data and sequence models have been the most commonly used. However, existing state-of-the-art methods disregard the issue of sequ... 详细信息
来源: 评论
detection of vulnerabilities in blockchain smart contracts using deep learning
收藏 引用
WIRELESS NETWORKS 2025年 第1期31卷 201-217页
作者: Gupta, Namya Aankur Bansal, Mansi Sharma, Seema Mehrotra, Deepti Kakkar, Misha Amity Univ Noida India
Blockchain helps to give a sense of security as there is only one history of transactions visible to all the involved parties. Smart contracts enable users to manage significant asset amounts of finances on the blockc... 详细信息
来源: 评论
Hierarchical Contextual Embedding with Hybrid Deep Ensemble for IoT Smart Contract Vulnerability detection
收藏 引用
SN Computer Science 2025年 第3期6卷 1-16页
作者: Taseen, Rakheeba Koul, Nimrita School of Computer Science and Engineering REVA University Karnataka Bengaluru 560064 India
Smart contracts, widely utilized in blockchain applications, are vulnerable to security threats that can lead to severe financial and operational consequences. This study introduces the Hierarchical Contextual Embeddi... 详细信息
来源: 评论
An automated framework for detecting and mitigating memory safety vulnerabilities in UEFI firmware
收藏 引用
COMPUTERS & ELECTRICAL ENGINEERING 2025年 122卷
作者: Lu, Zheng Tan, Yu-an Cheng, Xiaochun Zheng, Zhihan Shi, Ning Li, Yuanzhang Beijing Inst Technol Cyberspace Secur Dept Beijing 100081 Peoples R China Swansea Univ Comp Sci Dept Bay Campus Swansea SA1 8EN Wales Beijing Inst Technol Comp Sci Dept Beijing 100081 Peoples R China Hebei Key Lab IoT Blockchain Integrat Shijiazhuang 050035 Peoples R China
The Unified Extensible Firmware Interface (UEFI) firmware has seen a rapid escalation in program size and complexity, including complex functional modules, diverse driver loading schemes, and innovative interface conf... 详细信息
来源: 评论
VULHUNTER: TOWARD DISCOVERING vulnerabilities IN ANDROID APPLICATIONS
收藏 引用
IEEE MICRO 2015年 第1期35卷 44-53页
作者: Qian, Chenxiong Luo, Xiapu Le, Yu Gu, Guofei Hong Kong Polytech Univ Dept Comp Hong Kong Hong Kong Peoples R China Hong Kong Polytech Univ Shenzhen Res Inst Hong Kong Hong Kong Peoples R China Texas A&M Univ Dept Comp Sci & Engn College Stn TX 77843 USA
A NEW STATIC-ANALYSIS FRAMEWORK HELPS SECURITY ANALYSTS DETECT VULNERABLE APPLICATIONS. THE AUTHORS DESIGNED AN APP PROPERTY GRAPH (APG), CONDUCTED GRAPH TRAVERSALS OVER APGS, AND REDUCED THE MANUAL-VERIFICATION WORKL... 详细信息
来源: 评论
A smart contract vulnerability detection method based on deep learning with opcode sequences
收藏 引用
PEER-TO-PEER NETWORKING AND APPLICATIONS 2024年 第5期17卷 3222-3238页
作者: Li, Peiqiang Wang, Guojun Xing, Xiaofei Zhu, Jinyao Gu, Wanyi Zhai, Guangxin Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou 510006 Peoples R China
Ethereum is a blockchain network that allows developers to create smart contracts and programs that run on the blockchain. Smart contracts contain logic to transfer assets based on pre-defined conditions. With over 10... 详细信息
来源: 评论