咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 13 篇 期刊文献

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 19 篇 计算机科学与技术...
    • 10 篇 电气工程
    • 8 篇 信息与通信工程
    • 3 篇 网络空间安全
    • 2 篇 控制科学与工程
    • 1 篇 仪器科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 软件工程
  • 6 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 2 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 28 篇 vulnerability ex...
  • 3 篇 vulnerability di...
  • 3 篇 machine learning
  • 2 篇 honeypots
  • 2 篇 data oversamplin...
  • 2 篇 natural language...
  • 2 篇 os security
  • 2 篇 sip
  • 2 篇 kernel security
  • 2 篇 voip
  • 2 篇 security
  • 2 篇 privilege escala...
  • 2 篇 vulnerability
  • 2 篇 encryption
  • 2 篇 feature selectio...
  • 2 篇 security tests
  • 1 篇 attack intention
  • 1 篇 penetration test...
  • 1 篇 chinese remainde...
  • 1 篇 transfer weak pr...

机构

  • 3 篇 natl univ def te...
  • 2 篇 penn state univ ...
  • 1 篇 hashemite univ d...
  • 1 篇 univ amsterdam
  • 1 篇 siber guvenl bir...
  • 1 篇 department of ch...
  • 1 篇 state grid tianj...
  • 1 篇 natl univ singap...
  • 1 篇 xi’an jiaotong -...
  • 1 篇 so fed univ taga...
  • 1 篇 netas siber guve...
  • 1 篇 colorado state u...
  • 1 篇 univ texas san a...
  • 1 篇 tsinghua univers...
  • 1 篇 univ south austr...
  • 1 篇 guangzhou univ s...
  • 1 篇 korea univ dept ...
  • 1 篇 china univ geosc...
  • 1 篇 natl univ def te...
  • 1 篇 norwegian univ s...

作者

  • 2 篇 xing xinyu
  • 2 篇 wang pengfei
  • 2 篇 kilinc h. hakan
  • 2 篇 chen yueqi
  • 2 篇 liu danjun
  • 1 篇 fan wenjun
  • 1 篇 zhang boyu
  • 1 篇 younis awad
  • 1 篇 gao yuanming
  • 1 篇 lin jiayi
  • 1 篇 zhang xunlai
  • 1 篇 mohd bassam j.
  • 1 篇 xie xu zhou wei
  • 1 篇 jie cui
  • 1 篇 tian zhihong
  • 1 篇 luo zhenhao
  • 1 篇 liu miao
  • 1 篇 lu gang
  • 1 篇 veinovic mladen
  • 1 篇 li longlong

语言

  • 26 篇 英文
  • 1 篇 土耳其文
  • 1 篇 其他
检索条件"主题词=Vulnerability exploitation"
28 条 记 录,以下是1-10 订阅
排序:
Reverse engineering Java Card and vulnerability exploitation: a shortcut to ROM
收藏 引用
INTERNATIONAL JOURNAL OF INFORMATION SECURITY 2019年 第1期18卷 85-100页
作者: Mesbah, Abdelhak Lanet, Jean-Louis Mezghiche, Mohamed Univ Boumerdes Independence Ave Boumerdes 35000 Algeria INRIA LHS PEC 263 Ave Gen Leclerc F-35042 Rennes France
Secure elements store and manipulate assets in a secure way. The most attractive assets are the cryptographic keys stored into the memory that can be used to provide secure services to a system. For this reason, secur... 详细信息
来源: 评论
Automated vulnerability exploitation Using Deep Reinforcement Learning
收藏 引用
APPLIED SCIENCES-BASEL 2024年 第20期14卷 9331页
作者: Almajali, Anas Al-Abed, Loiy Yousef, Khalil M. Ahmad Mohd, Bassam J. Samamah, Zaid Abu Shhadeh, Anas Hashemite Univ Dept Comp Engn Fac Engn Zarqa 13115 Jordan Amer Univ Sharjah Dept Comp Sci & Engn Sharjah U Arab Emirates
The main objective of this paper is to develop a reinforcement agent capable of effectively exploiting a specific vulnerability. Automating pentesting can reduce the cost and time of the operation. While there are exi... 详细信息
来源: 评论
An effective evaluation model of vulnerability exploitation defense in dynamic trusted network
An effective evaluation model of vulnerability exploitation ...
收藏 引用
2013 International Conference on Sport Science and Computer Science (CCCS 2013)
作者: Wen Huang Guoyun Duan Department of computer and Communication Engineering Hunan University of Science and Engineering
This paper analyzed two potential vulnerability exploitations in trusted network authentication:TOCTOU attacks and substitution platform attack,and pointed out the system flaws in trusted terminal and remote trusted p... 详细信息
来源: 评论
Automated vulnerability Discovery and exploitation in the Internet of Things
收藏 引用
SENSORS 2019年 第15期19卷 3362-3362页
作者: Wang, Zhongru Zhang, Yuntao Tian, Zhihong Ruan, Qiang Liu, Tong Wang, Haichen Liu, Zhehui Lin, Jiayi Fang, Binxing Shi, Wei Beijing Univ Posts & Telecommun Minist Educ Key Lab Trustworthy Distributed Comp & Serv Beijing 100876 Peoples R China Guangzhou Univ Cyberspace Inst Adv Technol Guangzhou 510006 Guangdong Peoples R China Beijing DigApis Technol Co Ltd Beijing 100081 Peoples R China Carleton Univ Sch Informat Technol Ottawa ON K1S 5B6 Canada
Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT's fast adoption and high social impact. However, the task is chal... 详细信息
来源: 评论
Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel
收藏 引用
COMPUTERS & SECURITY 2025年 150卷
作者: Liu, Danjun Meng, Xuan Wang, Pengfei Xie, Xu Zhou Wei Natl Univ Def Technol Changsha Peoples R China
Researchers have proposed various methods to perform kernel exploitation, which facilitates vulnerability evaluation and fixing. To sum up, traditional approaches tend to construct ROP chains or perform arbitrary writ... 详细信息
来源: 评论
The efficiency of ICT suppliers' product security incident response teams in reducing the risk of exploitation of vulnerabilities in the wild
收藏 引用
COMPUTERS & SECURITY 2025年 152卷
作者: Radunovic, Vladimir Veinovic, Mladen Jevremovic, Aleksandar Singidunum Univ Beograd Serbia
exploitation of vulnerabilities in digital products is among the key components of cyberattacks. Suppliers of digital products use different security-by-design practices, such as a product security incident response t... 详细信息
来源: 评论
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps
收藏 引用
APPLIED MATHEMATICS AND COMPUTATION 2017年 第0期293卷 523-544页
作者: D'Orazio, Christian J. Lu, Rongxing Choo, Kim-Kwang Raymond Vasilakos, Athanasios V. Univ South Australia Sch Informat Technol & Math Sci Adelaide SA Australia Univ New Brunswick Fac Comp Sci Fredericton NB E3B 5A3 Canada Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX 78249 USA China Univ Geosci Sch Comp Sci Wuhan Peoples R China Lulea Univ Technol Dept Comp Sci Elect & Space Engn Lulea Sweden
With the increased convergence of technologies whereby a user can access, store and transmit data across different devices in real-time, risks will arise from factors such as lack of appropriate security measures in p... 详细信息
来源: 评论
Software systems at risk: An empirical study of cloned vulnerabilities in practice
收藏 引用
COMPUTERS & SECURITY 2018年 77卷 720-736页
作者: Kim, Seulbae Lee, Heejo Korea Univ Dept Comp Sci & Engn Seoul 136713 South Korea
With the growth of open source software (OSS), code clones - code fragments that are copied and pasted within or between software systems- are proliferating. Although code cloning may expedite the process of software ... 详细信息
来源: 评论
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2023年 18卷 533-548页
作者: Liu, Danjun Wang, Pengfei Zhou, Xu Xie, Wei Zhang, Gen Luo, Zhenhao Yue, Tai Wang, Baosheng Natl Univ Def Technol Sch Comp Sci Changsha 410073 Peoples R China
vulnerability fixing is time-consuming, hence, not all of the discovered vulnerabilities can be fixed timely. In reality, developers prioritize vulnerability fixing based on exploitability. Large numbers of vulnerabil... 详细信息
来源: 评论
Secret Cracking and Security Enhancement for the Image Application of CRT-Based Secret Sharing
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 9819-9834页
作者: Wang, Rui Li, Longlong Yang, Guozheng Yan, Xuehu Yan, Wei Natl Univ Def Technol Coll Elect Engn Hefei 230037 Peoples R China Anhui Prov Key Lab Cyberspace Secur Situat Awarene Hefei 230037 Peoples R China
The Asmuth and Bloom threshold secret sharing (AB-SS) is a classical introduction of the Chinese remainder theorem (CRT) to secret sharing, offering low computational complexity compared to other branches of secret sh... 详细信息
来源: 评论