Defitainter: Detecting price manipulation vulnerabilities in defi protocols
DeFi protocols are programs that manage high-value digital assets on blockchain. The price
manipulation vulnerability is one of the common vulnerabilities in DeFi protocols, which …
manipulation vulnerability is one of the common vulnerabilities in DeFi protocols, which …
[HTML][HTML] CrossFuzz: Cross-contract fuzzing for smart contract vulnerability detection
H Yang, X Gu, X Chen, L Zheng, Z Cui - Science of Computer …, 2024 - Elsevier
Context: Smart contracts are computer programs that run on a blockchain. As the functions
implemented by smart contracts become increasingly complex, the number of cross-contract …
implemented by smart contracts become increasingly complex, the number of cross-contract …
[PDF][PDF] Faster and Better: Detecting Vulnerabilities in Linux-Based IoT Firmware with Optimized Reaching Definition Analysis
Z Gao, C Zhang, H Liu, W Sun, Z Tang… - Proceedings of the …, 2024 - ndss-symposium.org
IoT devices are often found vulnerable, ie, untrusted inputs may trigger potential
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
vulnerabilities and flow to sensitive operations in the firmware, which could cause severe …
Android static taint analysis based on multi branch search association
C Tang, Z Du, M Yang, B Qiang - Computers & Security, 2023 - Elsevier
Taint analysis is a method used to detect system security problems by tracking the flow of
user input or information leakage through the system. In the taint analysis for Android …
user input or information leakage through the system. In the taint analysis for Android …
[PDF][PDF] 开源软件供应链安全研究综述
纪守领, 王琴应, 陈安莹, 赵彬彬, 叶童, 张旭鸿… - 软件学报, 2022 - nesa.zju.edu.cn
随着**年来开源软件的蓬勃发展, 现代化软件的开发和供应模式极大地促进开源软件自身的快速
迭代和演进, 也提高了社会效益. 新兴的开源协作的软件开发模式使得软件开发供应流程由较为 …
迭代和演进, 也提高了社会效益. 新兴的开源协作的软件开发模式使得软件开发供应流程由较为 …
LuaTaint: A Static Analysis System for Web Configuration Interface Vulnerability of Internet of Things Device
J **ang, L Fu, T Ye, P Liu, H Le, L Zhu… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The diversity of web configuration interfaces for IoT devices has exacerbated issues such as
inadequate permission controls and insecure interfaces, resulting in various vulnerabilities …
inadequate permission controls and insecure interfaces, resulting in various vulnerabilities …
Research on SQL injection detection based on deep learning
Z Liu - 2023 IEEE 7th Information Technology and …, 2023 - ieeexplore.ieee.org
With the rapid development of modern information technology, web applications have
gradually become important service providers in people's daily work and life. However …
gradually become important service providers in people's daily work and life. However …
A Dynamic Taint Analysis Framework Based on Entity Equipment
Y Ren, W Dong, J Lin, X Miao - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things, the security of embedded device has
received extensive attention. Taint analysis technology can improve the understanding of …
received extensive attention. Taint analysis technology can improve the understanding of …
Application of static taint analysis in RASP protection strategy
M Ji, M Yin, YH Zhou - … of the 2022 International Conference on Cyber …, 2022 - dl.acm.org
Program analysis plays an important role in ensuring the safety and correctness of
Programs. Based on the cloud native security system and from the perspective of building a …
Programs. Based on the cloud native security system and from the perspective of building a …
Binary Program Vulnerability Mining Based on Neural Network.
Z Li, S **ng, L Yu, H Li, F Zhou, G Yin… - Computers …, 2024 - search.ebscohost.com
Software security analysts typically only have access to the executable program and cannot
directly access the source code of the program. This poses significant challenges to security …
directly access the source code of the program. This poses significant challenges to security …