SBOM. EXE: Countering Dynamic Code Injection based on Software Bill of Materials in Java

A Sharma, M Wittlinger, B Baudry… - arxiv preprint arxiv …, 2024 - arxiv.org
Software supply chain attacks have become a significant threat as software development
increasingly relies on contributions from multiple, often unverified sources. The code from …

Test Suites Guided Vulnerability Validation for Node. js Applications

C Luo, P Li, W Meng, C Zhang - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Dynamic methods have shown great promise in validating vulnerabilities and generating
Proof-of-Concept (PoC) exploits of Node. js applications. They typically rely on dictionaries …

A Network Attack Surface Evaluation Method Based on Optimal Attack Strategy.

P **e, L Zhang, Z Lian, J Yang - Electronics (2079-9292), 2025 - search.ebscohost.com
In the era of the rapid development of information technology, it is particularly important to
ensure the security of information systems. The network attack surface, as an important …