Although pre-trained language models (PLMs) have achieved great success and become a milestone in NLP, abstractive conversational summarization remains a challenging but less studied task. The difficulty lies in two a...
详细信息
Regular expressions are widely used within and even outside of computer science due to their expressiveness and ***, regular expressions have a quite compact and rather tolerant syntax that makes them hard to understa...
Regular expressions are widely used within and even outside of computer science due to their expressiveness and ***, regular expressions have a quite compact and rather tolerant syntax that makes them hard to understand, hard to compose,and error-prone. Faulty regular expressions may cause failures of the applications that use them. Therefore, ensuring the correctness of regular expressions is a vital prerequisite for their use in practical applications. The importance and necessity of ensuring correct definitionsofregularexpressionshaveattractedextensiveattentionfromresearchersandpractitioners,*** study, we provide a review of the recent works for ensuring the correct usage of regular expressions. We classify those works into different categories, including the empirical study, test string generation, automatic synthesis and learning, static checking and verification,visual representation and explanation, and repairing. For each category, we review the main results, compare different approaches, and discuss their advantages and disadvantages. We also discuss some potential future research directions.
Data, a key asset in Industrial Internet of Things(IIoT), has fueled the emergence of a new data trading in-dustry, which can be collected and traded for better development of IIoT. However, copyright protection is no...
详细信息
Effective diagnosis of real-time system performance defects is of great significance in practical scenarios. Traditional performance defect detection methods are limited in localization and time-cost, which restrict t...
详细信息
Public opinion is a crucial factor in shaping political decision-making. Nowadays, social media has become an essential platform for individuals to engage in political discussions and express their political views, pr...
详细信息
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. The existing AEG usually sets the preset environment id...
详细信息
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. Generally speaking, the process of finding vulnerabilit...
Automatic exploit generation (AEG) refers to the process of automatically finding the path in the program that can trigger vulnerabilities and generate exploits. Generally speaking, the process of finding vulnerabilities needs to apply fuzzing and symbolic execution techniques. Existing AEG generally targets executables for regular Linux and Windows platforms, but no AEG for vulnerable Internet of Things (IoT) devices. In response to this situation, we propose the exploit generation system IoTAEG, which automatically detects stack overflow vulnerabilities in the firmware of IoT devices, and automatically generates and exploits the generation system based on the stack overflow vulnerabilities. IoTAEG uses the mature fuzzing software AFL++ to detect vulnerabilities in IoT devices, uses the crashed input found by AFL++ to construct a symbolic state through symbolic execution, dynamically analyzes the constructed symbolic state, and detects whether there are exploitable vulnerabilities. If the above vulnerabilities exist, different exploit generation strategies will be adopted for different protection mechanisms, and some protection mechanisms such as Address space layout randomization (ASLR) and Non-eXecute (NX) will be bypassed. For some difficult-to-exploit cases, IoTAEG uses advanced stack overflow exploitation methods to generate exploits. Experiments show that IoTAEG can complete 20 MIPS/ARM binary files and 8 IoT devices’ firmware vulnerability detection and exploit generation. IoTAEG is the first publicly available vulnerability mining and exploit generation system for IoT devices.
Large Transformer-based Pretrained Language Models (PLMs) dominate almost all Natural Language Processing (NLP) tasks. Nevertheless, they still make mistakes from time to time. For a model deployed in an industrial en...
详细信息
Dear editor,Various open source software hosting sites, such as Github,provide support for pull-based development and allow developers to flexibly and efficiently make contributions [1].
Dear editor,Various open source software hosting sites, such as Github,provide support for pull-based development and allow developers to flexibly and efficiently make contributions [1].
Goal-oriented modeling is an effective way for modeling and analyzing the requirements of users. It takes stakeholder s intentions as the main clue and analyzes their goals and tasks to construct hierarchical requirem...
详细信息
暂无评论