Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fuzzing: a survey for roadmap
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …
generates a large number of test cases and monitors the executions for defects. Fuzzing has …
Deep learning based vulnerability detection: Are we there yet?
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …
security. Existing program analysis techniques either suffer from high false positives or false …
Software vulnerability detection using deep neural networks: a survey
The constantly increasing number of disclosed security vulnerabilities have become an
important concern in the software industry and in the field of cybersecurity, suggesting that …
important concern in the software industry and in the field of cybersecurity, suggesting that …
Shadewatcher: Recommendation-guided cyber threat analysis using system audit records
System auditing provides a low-level view into cyber threats by monitoring system entity
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
interactions. In response to advanced cyber-attacks, one prevalent solution is to apply data …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
Transformer-based language models for software vulnerability detection
The large transformer-based language models demonstrate excellent performance in
natural language processing. By considering the transferability of the knowledge gained by …
natural language processing. By considering the transferability of the knowledge gained by …
Directed greybox fuzzing
Existing Greybox Fuzzers (GF) cannot be effectively directed, for instance, towards
problematic changes or patches, towards critical system calls or dangerous locations, or …
problematic changes or patches, towards critical system calls or dangerous locations, or …
{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture
CPU vulnerabilities undermine the security guarantees provided by software-and hardware-
security improvements. While the discovery of transient-execution attacks increased the …
security improvements. While the discovery of transient-execution attacks increased the …
Modeling and discovering vulnerabilities with code property graphs
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …
code. Consequently, the protection of computer systems critically depends on the rigorous …
Lava: Large-scale automated vulnerability addition
Work on automating vulnerability discovery has long been hampered by a shortage of
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …
ground-truth corpora with which to evaluate tools and techniques. This lack of ground truth …