Response to the outbreak of COVID-19, classes in this semester are mainly replaced by online teaching to ensure continual learning. Teachers are actively exploring effective online teaching methods to provide a good l...
详细信息
UEFI is widely used as the new generation BIOS, except for some new features, it also brings some security issues. The threat brought by S3 sleep jeopardizes the security of computer platforms seriously. An attacker c...
详细信息
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and ...
详细信息
ISBN:
(纸本)9781849199094
Fuzz testing is an important way of vulnerability discovery, however, the existing fuzzers based on symbolic execution and others have inherent shortcomings like needing more computing resource, in-depth analysis and so on. To solve above problems, this paper presents a smart fuzzing method based on Markov chain. Firstly, this method optimizes the testing input sample to get the minimal sample set. Secondly, this method records program execution information by using instrument, and makes a Markov model about state. Finally, this method uses Markov chain to detect the change of execution path, and leads tester to choose better samples to mutate. Meanwhile, we analyse mutation strategies in depth for better triggering exception. Experimental data shows that the presented method can help fuzzer to generate effective test samples. We discovers 51 vulnerabilities in software like WPS, along with the code coverage increases of nearly 49% comparing with zzuf and the average exception discovery rate increase nearly 9 times comparing with MiniFuzz.
With the intensification of informatization and mobility, various web security threats are emerging. Cross-site scripting (XSS) attack is the most common type of web attack. Most traditional detection methods have bee...
详细信息
Security assessment is one of the important problems, especially in the fields of military training, transportation and network management. The security "related parties"(entities in this paper) have interna...
详细信息
Device simulation is an important method of embedded device security analysis, due to the extensive and heterogeneous nature of the current peripherals, the existing simulation technology for peripheral simulation is ...
详细信息
Extreme rainfall events are becoming increasingly severe under a warming climate. North China has experienced several catastrophic rainfall events, of which the rainstorm in 2023 was particularly severe inducing unpre...
详细信息
Two-dimensional (2D) van der Waals (vdW) ferromagnets provide an excellent platform for exploring exotic physical phenomena such as magnetic skyrmions and quantum topological phases. However, the centrosymmetric cryst...
详细信息
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can b...
详细信息
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can be completely characterized. Furthermore, an alternative proof of Kjeldsen’s results is presented. Compared with the original proof based on abstract algebra theory, ours is straightforward and easy to understand.
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, th...
详细信息
ISBN:
(纸本)9781509039456;9781509039449
this paper presents a novel path-sensitive static analysis method for detecting taint-style vulnerabilities in PHP code. The new method includes three key, the first of which is path searching during a basic block, the second is path searching between blocks, and the third is path searching crossing function call. A tool name POSE implements the new method and the testing results show the method is valid for taint-style vulnerabilities in PHP code.
暂无评论