Results 51 to 60 of about 22,224 (372)

Testing and Debugging Techniques for Answer Set Solver Development

open access: yes, 2010
This paper develops automated testing and debugging techniques for answer set solver development. We describe a flexible grammar-based black-box ASP fuzz testing tool which is able to reveal various defects such as unsound and incomplete behavior, i.e ...
Brummayer, Robert, Järvisalo, Matti
core   +2 more sources

Brief announcement: passive and active attacks on audience response systems using software defined radios [PDF]

open access: yes, 2017
Audience response systems, also known as clickers, are used at many academic institutions to offer active learning environments. Since these systems are used to administer graded assignments, and sometimes even exams, it is crucial to assess their ...
Ewing, Ryan   +3 more
core   +1 more source

ESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities

open access: yesCybersecurity, 2021
SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules,
Yu Zhang   +7 more
doaj   +1 more source

EM-Fuzz: Augmented Firmware Fuzzing via Memory Checking [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
Embedded systems are increasingly interconnected in the emerging application scenarios. Many of these applications are safety critical, making it a high priority to ensure that the systems are free from malicious attacks. This work aims to detect vulnerabilities, that could be exploited by adversaries to compromise functional correctness, in the ...
Jian Gao   +6 more
openaire   +2 more sources

A methodology for testing virtualisation security [PDF]

open access: yes, 2017
There is a growing interest in virtualisation due to its central role in cloud computing, virtual desktop environments and Green IT. Data centres and cloud computing utilise this technology to run multiple operating systems on one physical server, thus ...
Coull, Natalie   +2 more
core   +2 more sources

Angora: Efficient Fuzzing by Principled Search [PDF]

open access: yesIEEE Symposium on Security and Privacy, 2018
Fuzzing is a popular technique for finding software bugs. However, the performance of the state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution produce quality inputs but run slow, while fuzzers based on random mutation
Peng Chen, Hao Chen
semanticscholar   +1 more source

V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing

open access: yes, 2019
Fuzzing is a technique of finding bugs by executing a software recurrently with a large number of abnormal inputs. Most of the existing fuzzers consider all parts of a software equally, and pay too much attention on how to improve the code coverage. It is inefficient as the vulnerable code only takes a tiny fraction of the entire code.
Li, Yuwei   +6 more
openaire   +2 more sources

A Study of Degenerate Four-quark states in SU(2) Lattice Monte Carlo [PDF]

open access: yes, 1995
The energies of four-quark states are calculated for geometries in which the quarks are situated on the corners of a series of tetrahedra and also for geometries that correspond to gradually distorting these tetrahedra into a plane.
A. Huntley   +17 more
core   +3 more sources

Multi‐omics and low‐input proteomics profiling reveals dynamic regulation driving pluripotency initiation in early mouse embryos

open access: yesFEBS Open Bio, EarlyView.
Mouse pre‐implantation development involves a transition from totipotency to pluripotency. Integrating transcriptomics, epigenetic profiling, low‐input proteomics and functional assays, we show that eight‐cell embryos retain residual totipotency features, whereas cytoskeletal remodeling regulated by the ubiquitin‐proteasome system drives progression ...
Wanqiong Li   +8 more
wiley   +1 more source

FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage

open access: yes, 2017
In recent years, fuzz testing has proven itself to be one of the most effective techniques for finding correctness bugs and security vulnerabilities in practice.
Böhme Marcel   +9 more
core   +1 more source

Home - About - Disclaimer - Privacy