A survey on malware detection using data mining techniques
In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed
serious and evolving security threats to Internet users. To protect legitimate users from these …
serious and evolving security threats to Internet users. To protect legitimate users from these …
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
[PDF][PDF] Large language model guided protocol fuzzing
How to find security flaws in a protocol implementation without a machine-readable
specification of the protocol? Facing the internet, protocol implementations are particularly …
specification of the protocol? Facing the internet, protocol implementations are particularly …
AFLNet: a greybox fuzzer for network protocols
Server fuzzing is difficult. Unlike simple command-line tools, servers feature a massive state
space that can be traversed effectively only with well-defined sequences of input messages …
space that can be traversed effectively only with well-defined sequences of input messages …
[PDF][PDF] AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares.
To address the growing concerns about the security of embedded systems, it is important to
perform accurate analysis of firmware binaries, even when the source code or the hardware …
perform accurate analysis of firmware binaries, even when the source code or the hardware …
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
Dynamic taint analysis and forward symbolic execution are quickly becoming staple
techniques in security analyses. Example applications of dynamic taint analysis and forward …
techniques in security analyses. Example applications of dynamic taint analysis and forward …
Program-adaptive mutational fuzzing
We present the design of an algorithm to maximize the number of bugs found for black-box
mutational fuzzing given a program and a seed input. The major intuition is to leverage white …
mutational fuzzing given a program and a seed input. The major intuition is to leverage white …
BitBlaze: A new approach to computer security via binary analysis
In this paper, we give an overview of the BitBlaze project, a new approach to computer
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
security via binary analysis. In particular, BitBlaze focuses on building a unified binary …
[PDF][PDF] Scalable, behavior-based malware clustering.
Anti-malware companies receive thousands of malware samples every day. To process this
large quantity, a number of automated analysis tools were developed. These tools execute a …
large quantity, a number of automated analysis tools were developed. These tools execute a …