Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Demystify the fuzzing methods: A comprehensive survey
S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …
structures; in such cases, vulnerabilities in the software become inevitable. The …
Fuzzing of embedded systems: A survey
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Sok: Prudent evaluation practices for fuzzing
Fuzzing has proven to be a highly effective approach to uncover software bugs over the past
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
decade. After AFL popularized the groundbreaking concept of lightweight coverage …
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference
The proliferation of Internet of Things (IoT) devices has made people's lives more
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
convenient, but it has also raised many security concerns. Due to the difficulty of obtaining …
Firmae: Towards large-scale emulation of iot firmware for dynamic analysis
One approach to assess the security of embedded IoT devices is applying dynamic analysis
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
such as fuzz testing to their firmware in scale. To this end, existing approaches aim to …
Nyx-net: network fuzzing with incremental snapshots
Coverage-guided fuzz testing (" fuzzing") has become mainstream and we have observed
lots of progress in this research area recently. However, it is still challenging to efficiently test …
lots of progress in this research area recently. However, it is still challenging to efficiently test …
Automatic firmware emulation through invalidity-guided knowledge inference
Emulating firmware for microcontrollers is challenging due to the tight coupling between the
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
hardware and firmware. This has greatly impeded the application of dynamic analysis tools …
A review of IoT firmware vulnerabilities and auditing techniques
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …
variety of industrial and consumer areas to facilitate greater automation and increase …
Jetset: Targeted firmware rehosting for embedded systems
The ability to execute code in an emulator is a fundamental part of modern vulnerability
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …
testing. Unfortunately, this poses a challenge for many embedded systems, where firmware …