Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …
security. Due to their potential high severity impacts, many different approaches have been …
A systematic review of fuzzing techniques
C Chen, B Cui, J Ma, R Wu, J Guo, W Liu - Computers & Security, 2018 - Elsevier
Fuzzing is an effective and widely used technique for finding security bugs and
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …
vulnerabilities in software. It inputs irregular test data into a target program to try to trigger a …
Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …
significantly improve the performance of vulnerability detection. They represent code in …
Directed greybox fuzzing
Existing Greybox Fuzzers (GF) cannot be effectively directed, for instance, towards
problematic changes or patches, towards critical system calls or dangerous locations, or …
problematic changes or patches, towards critical system calls or dangerous locations, or …
Coverage-based greybox fuzzing as markov chain
Coverage-based Greybox Fuzzing (CGF) is a random testing approach that requires no
program analysis. A new test is generated by slightly mutating a seed input. If the test …
program analysis. A new test is generated by slightly mutating a seed input. If the test …
Vuzzer: Application-aware evolutionary fuzzing
Fuzzing is an effective software testing technique to find bugs. Given the size and complexity
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
of real-world applications, modern fuzzers tend to be either scalable, but not effective in …
Modeling and discovering vulnerabilities with code property graphs
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …
code. Consequently, the protection of computer systems critically depends on the rigorous …
Harvey: A greybox fuzzer for smart contracts
We present Harvey, an industrial greybox fuzzer for smart contracts, which are programs
managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation …
managing accounts on a blockchain. Greybox fuzzing is a lightweight test-generation …
Internet-of-Things (IoT) Systems
The Internet of Things is the evolutionary step of the Internet that creates a worldwide
infrastructure interconnecting machines and humans. As the Internet became public in the …
infrastructure interconnecting machines and humans. As the Internet became public in the …
[PDF][PDF] Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Coverage-based fuzzing has been actively studied and widely adopted for finding
vulnerabilities in real-world software applications. With coverage information, such as …
vulnerabilities in real-world software applications. With coverage information, such as …