Results 31 to 40 of about 22,224 (372)
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing [PDF]
Smart contracts, the cornerstone of decentralized applications, have become increasingly prominent in revolutionizing the digital landscape. However, vulnerabilities in smart contracts pose great risks to user assets and undermine overall trust in ...
Ruichao Liang +8 more
semanticscholar +1 more source
A Gray-box Test Technology Based on Intelligent Inference of Protocol Format [PDF]
Communication protocols ensure secure communication between network applications and IoT devices. However, the fragility of their design and implementation can result in serious security threats and hidden dangers.
Huayu LIU, Shuitao GAN, Xiaokang YIN, Xiaolong LIU, Shengli LIU, Hongliang LI
doaj +1 more source
Further Evidence for an unstable H-Dibaryon? [PDF]
We present preliminary results for the mass of the 6q flavor-singlet state ($J^P=0^+$, $S=-2$) called H-dibaryon, calculated in quenched QCD on $16^3$x30 and $24^3$x30 lattices with improved gauge and fermion actions (Symanzik improvement, Clover action).
Karsch, F., Laermann, E., Wetzorke, I.
core +2 more sources
Towards Smart Hybrid Fuzzing for Smart Contracts [PDF]
Smart contracts are Turing-complete programs that are executed across a blockchain network. Unlike traditional programs, once deployed they cannot be modified.
Gervais, Arthur +3 more
core +2 more sources
Survey of evolutionary kernel fuzzing
Fuzzing is a technique that was used to detect potential vulnerabilities and errors in software or systems by generating random, abnormal, or invalid test cases.When applying fuzzing to the kernel, more complex and challenging obstacles were encountered ...
Yan SHI, Weizhong QIANG, Deqing ZOU, Hai JIN
doaj +3 more sources
Detection of Web Command Injection Vulnerability for Cisco IOS-XE [PDF]
Cisco’s new operating system,Cisco IOS-XE,is widely deployed on platforms such as Cisco routers and switches.However,there are vulnerabilities in the system’s Web management interface to allow permission escalation through command injection.Network ...
HE Jie, CAI Ruijie, YIN Xiaokang, LU Xuanting, LIU Shengli
doaj +1 more source
ContractFuzzer: Fuzzing Smart Contracts for Vulnerability Detection [PDF]
Decentralized cryptocurrencies feature the use of blockchain to transfer values among peers on networks without central agency. Smart contracts are programs running on top of the blockchain consensus protocol to enable people make agreements while ...
B. Jiang, Ye Liu, W. Chan
semanticscholar +1 more source
A Novel Fuzzing Method for Zigbee Based on Finite State Machine
With the extensive application of Zigbee, some bodies of literature were devoted into finding the vulnerabilities of Zigbee by fuzzing. According to earlier test records, the majority of defects were exposed due to a series of testing cases. However, the
Baojiang Cui +4 more
doaj +1 more source
MobFuzz: Adaptive Multi-objective Optimization in Gray-box Fuzzing [PDF]
Coverage-guided gray-box fuzzing (CGF) is an efficient software testing technique. There are usually multiple objectives to optimize in CGF. However, existing CGF methods cannot successfully find the optimal values for multiple objectives simultaneously.
Gen Zhang +6 more
semanticscholar +1 more source
Scaling in the Positive Plaquette Model and Universality in SU(2) Lattice Gauge Theory [PDF]
We investigate universality, scaling, the beta-function and the topological charge in the positive plaquette model for SU(2) lattice gauge theory. Comparing physical quantities, like the critical temperature, the string tension, glueball masses, and ...
Albanese +53 more
core +2 more sources

