Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Bridging the gap: A survey and classification of research-informed ethical hacking tools
The majority of Ethical Hacking (EH) tools utilised in penetration testing are developed by
practitioners within the industry or underground communities. Similarly, academic …
practitioners within the industry or underground communities. Similarly, academic …
Oddfuzz: Discovering java deserialization vulnerabilities via structure-aware directed greybox fuzzing
Java deserialization vulnerability is a severe threat in practice. Researchers have proposed
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …
static analysis solutions to locate candidate vulnerabilities and fuzzing solutions to generate …
Silent spring: Prototype pollution leads to remote code execution in Node. js
Prototype pollution is a dangerous vulnerability affecting prototype-based languages like
JavaScript and the Node. js platform. It refers to the ability of an attacker to inject properties …
JavaScript and the Node. js platform. It refers to the ability of an attacker to inject properties …
Improving java deserialization gadget chain mining via overriding-guided object generation
Java (de) serialization is prone to causing security-critical vulnerabilities that attackers can
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
invoke existing methods (gadgets) on the application's classpath to construct a gadget chain …
An in-depth study of java deserialization remote-code execution exploits and vulnerabilities
Nowadays, an increasing number of applications use deserialization. This technique, based
on rebuilding the instance of objects from serialized byte streams, can be dangerous since it …
on rebuilding the instance of objects from serialized byte streams, can be dangerous since it …
{FUGIO}: Automatic exploit generation for {PHP} object injection vulnerabilities
A PHP object injection (POI) vulnerability is a security-critical bug that allows the remote
code execution of class methods existing in a vulnerable PHP application. Exploiting this …
code execution of class methods existing in a vulnerable PHP application. Exploiting this …
Undefined-oriented programming: Detecting and chaining prototype pollution gadgets in node. js template engines for malicious consequences
Prototype pollution is a type of recently-discovered, impactful vulnerability that affects
JavaScript code. One important yet challenging research problem of prototype pollution is …
JavaScript code. One important yet challenging research problem of prototype pollution is …
Efficient detection of java deserialization gadget chains via bottom-up gadget search and dataflow-aided payload construction
Java Object Injection (JOI) is a severe type of vulnerability affecting Java deserialization,
which allows adversaries to inject a well-crafted, serialized object, thus triggering a series of …
which allows adversaries to inject a well-crafted, serialized object, thus triggering a series of …
URadar: discovering unrestricted file upload vulnerabilities via adaptive dynamic testing
Y Chen, Y Li, Z Pan, Y Lu, J Chen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Unrestricted file upload (UFU) vulnerabilities, especially unrestricted executable file upload
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …
(UEFU) vulnerabilities, pose severe security risks to web servers. For instance, attackers can …
Seneca: Taint-based call graph construction for java object deserialization
Object serialization and deserialization are widely used for storing and preserving objects in
files, memory, or database as well as for transporting them across machines, enabling …
files, memory, or database as well as for transporting them across machines, enabling …