Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …
fields of study. Still, it is sometimes unclear what research areas are included in the …
A systematic review of fuzzing based on machine learning techniques
Y Wang, P Jia, L Liu, C Huang, Z Liu - PloS one, 2020 - journals.plos.org
Security vulnerabilities play a vital role in network security system. Fuzzing technology is
widely used as a vulnerability discovery technology to reduce damage in advance …
widely used as a vulnerability discovery technology to reduce damage in advance …
{MOPT}: Optimized mutation scheduling for fuzzers
Mutation-based fuzzing is one of the most popular vulnerability discovery solutions. Its
performance of generating interesting test cases highly depends on the mutation scheduling …
performance of generating interesting test cases highly depends on the mutation scheduling …
The ethics of advanced ai assistants
This paper focuses on the opportunities and the ethical and societal risks posed by
advanced AI assistants. We define advanced AI assistants as artificial agents with natural …
advanced AI assistants. We define advanced AI assistants as artificial agents with natural …
Neuzz: Efficient fuzzing with neural program smoothing
Fuzzing has become the de facto standard technique for finding software vulnerabilities.
However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger …
However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger …
{GREYONE}: Data flow sensitive fuzzing
Data flow analysis (eg, dynamic taint analysis) has proven to be useful for guiding fuzzers to
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …
Wuji: Automatic online combat game testing using evolutionary deep reinforcement learning
Game testing has been long recognized as a notoriously challenging task, which mainly
relies on manual playing and scripting based testing in game industry. Even until recently …
relies on manual playing and scripting based testing in game industry. Even until recently …
Automatic web testing using curiosity-driven reinforcement learning
Web testing has long been recognized as a notoriously difficult task. Even nowadays, web
testing still mainly relies on manual efforts in many cases while automated web testing is still …
testing still mainly relies on manual efforts in many cases while automated web testing is still …
Pangolin: Incremental hybrid fuzzing with polyhedral path abstraction
Hybrid fuzzing, which combines the merits of both fuzzing and concolic execution, has
become one of the most important trends in coverage-guided fuzzing techniques. Despite …
become one of the most important trends in coverage-guided fuzzing techniques. Despite …
{SyzVegas}: Beating kernel fuzzing odds with reinforcement learning
Fuzzing embeds a large number of decisions requiring finetuned and hard-coded
parameters to maximize its efficiency. This is especially true for kernel fuzzing due to (1) OS …
parameters to maximize its efficiency. This is especially true for kernel fuzzing due to (1) OS …