Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Dynamic malware analysis in the modern era—A state of the art survey
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …
the sophistication and innovation of malware has increased over the years. In particular, the …
A survey of symbolic execution techniques
R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
{AFL++}: Combining incremental steps of fuzzing research
A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX workshop on …, 2020 - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …
state-of-the-art fuzzing research, to make the research comparable, reproducible …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
[PDF][PDF] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.
C Sendner, H Chen, H Fereidooni, L Petzi, J König… - NDSS, 2023 - ndss-symposium.org
Ethereum smart contracts are automated decentralized applications on the blockchain that
describe the terms of the agreement between buyers and sellers, reducing the need for …
describe the terms of the agreement between buyers and sellers, reducing the need for …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
Sereum: Protecting existing smart contracts against re-entrancy attacks
Recently, a number of existing blockchain systems have witnessed major bugs and
vulnerabilities within smart contracts. Although the literature features a number of proposals …
vulnerabilities within smart contracts. Although the literature features a number of proposals …
Fuzzing: State of the art
H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
50 ways to leak your data: An exploration of apps' circumvention of the android permissions system
J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …
sensitive data and system resources. However, apps can circumvent the permission model …
Smart greybox fuzzing
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …