[HTML][HTML] Vulnerability detection through machine learning-based fuzzing: A systematic review

SB Chafjiri, P Legg, J Hong, MA Tsompanas - Computers & Security, 2024 - Elsevier
Modern software and networks underpin our digital society, yet the rapid growth of
vulnerabilities that are uncovered within these threaten our cyber security posture …

The bandit's states: Modeling state selection for stateful network fuzzing as multi-armed bandit problem

A Borcherding, M Giraud, I Fitzgerald… - 2023 IEEE European …, 2023 - ieeexplore.ieee.org
Network interfaces of Industrial Control Systems are a common entry point for attackers, and
thus need to be thoroughly tested for vulnerabilities. One way to perform such tests is with …

PPO-based resilient control framework for safer operation of exothermic CSTR

M Yu, B Li, S Zhao, N Roy, B Zhang - Process Safety and Environmental …, 2025 - Elsevier
The safety of chemical reactor is one of the major problems in process safety that has
caused numerous incidents and has had detrimental effects on individual health and …

DCGFuzz: An Embedded Firmware Security Analysis Method with Dynamically Co-Directional Guidance Fuzzing

Y Wang, Y Li - Electronics, 2024 - mdpi.com
Microcontroller Units (MCUs) play a vital role in embedded devices due to their energy
efficiency and scalability. The firmware in MCUs contains vulnerabilities that can lead to …

[PDF][PDF] Use of Accessible Inormation to Improve Industrial Security Testing

A Borcherding - 2024 - d-nb.info
Since the discovery of the Stuxnet cyber attack that damaged several nuclear centrifuges in
2010, it has become evident that industrial control and automation systems are increasingly …

基于分布散度的自适应模糊测试优化方法

许航, 计江安, 马哲宇, 张超 - 网络与信息安全学报, 2024 - infocomm-journal.com
为了提高覆盖引导的模糊测试的性能, 提出一种利用分布散度和深度**化学**模型自适应模糊
测试的优化方法. 基于过程间控制流图构建过程间比较流图, 以刻画被测程序分支判断变量对应 …