Defitainter: Detecting price manipulation vulnerabilities in defi protocols
DeFi protocols are programs that manage high-value digital assets on blockchain. The price
manipulation vulnerability is one of the common vulnerabilities in DeFi protocols, which …
manipulation vulnerability is one of the common vulnerabilities in DeFi protocols, which …
[HTML][HTML] CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection
H Yang, X Gu, X Chen, L Zheng, Z Cui - Science of Computer …, 2024 - Elsevier
Context: Smart contracts are computer programs that run on a blockchain. As the functions
implemented by smart contracts become increasingly complex, the number of cross-contract …
implemented by smart contracts become increasingly complex, the number of cross-contract …
[PDF][PDF] Faster and Better: Detecting Vulnerabilities in Linux-Based IoT Firmware with Optimized Reaching Definition Analysis
Z Gao, C Zhang, H Liu, W Sun, Z Tang… - Proceedings of the …, 2024 - ndss-symposium.org
IoT devices are often found vulnerable, ie, untrusted inputs may trigger potential
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
VulPathsFinder: A Static Method for Finding Vulnerable Paths in PHP Applications Based on CPG
C Zhao, T Tu, C Wang, S Qin - Applied Sciences, 2023 - mdpi.com
Today, as PHP application technology is becoming increasingly mature, the functions of
modern multi-layer web applications are becoming more and more complete, and the …
modern multi-layer web applications are becoming more and more complete, and the …
Android static taint analysis based on multi branch search association
C Tang, Z Du, M Yang, B Qiang - Computers & Security, 2023 - Elsevier
Taint analysis is a method used to detect system security problems by tracking the flow of
user input or information leakage through the system. In the taint analysis for Android …
user input or information leakage through the system. In the taint analysis for Android …
[PDF][PDF] Binary Program Vulnerability Mining Based on Neural Network.
Z Li, S **ng, L Yu, H Li, F Zhou, G Yin… - … Materials & Continua, 2024 - cdn.techscience.cn
Software security analysts typically only have access to the executable program and cannot
directly access the source code of the program. This poses significant challenges to security …
directly access the source code of the program. This poses significant challenges to security …
A dynamic taint analysis framework based on entity equipment
Y Ren, W Dong, J Lin, X Miao - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things, the security of embedded device has
received extensive attention. Taint analysis technology can improve the understanding of …
received extensive attention. Taint analysis technology can improve the understanding of …
LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices
J **ang, W Wang, T Ye, P Liu - arxiv preprint arxiv:2402.16043, 2024 - arxiv.org
IoT devices are currently facing continuous malicious attacks due to their widespread use.
Among these IoT devices, web vulnerabilities are also widely exploited because of their …
Among these IoT devices, web vulnerabilities are also widely exploited because of their …
TaintSE: Dynamic Taint Analysis Combined with Symbolic Execution and Constraint Association
C Tang, X Guan, M Yang… - 2023 IEEE 14th …, 2023 - ieeexplore.ieee.org
In order to solve the problem of under-tainting caused by insufficient coverage in dynamic
taint analysis and the inability to perform fine-grained level analysis, a dynamic taint analysis …
taint analysis and the inability to perform fine-grained level analysis, a dynamic taint analysis …
面向源代码的软件漏洞静态检测综述
**珍, 邹德清, 王泽丽, 金海 - 网络与信息安全学报, 2019 - infocomm-journal.com
软件静态漏洞检测依据分析对象主要分为二进制漏洞检测和源代码漏洞检测.
由于源代码含有更为丰富的语义信息而备受代码审查人员的青睐. 针对现有的源代码漏洞检测 …
由于源代码含有更为丰富的语义信息而备受代码审查人员的青睐. 针对现有的源代码漏洞检测 …