Results 61 to 70 of about 22,224 (372)
Amino acids sequence of two different proteins with the same sequence (chameleon sequence—black boxes) represent in 3D structure of the proteins different secondary structures: HHHH—helical and BBB—Beta‐structural. The chains folded in water environment adopt different III‐order structures in which the chameleon fragments appear to adopt similar status
Irena Roterman +4 more
wiley +1 more source
SHFuzz: Selective Hybrid Fuzzing with Branch Scheduling Based on Binary Instrumentation
Hybrid fuzzing is a popular software testing technique that combines random fuzzing with concolic execution. It is widely used in the security domain known for its ability to find deeply hidden vulnerabilities and reach high code coverage. Hybrid fuzzing
Xianya Mi +4 more
doaj +1 more source
Breaking of the adjoint string in 2+1 dimensions
The roughly linear rise of the potential found between adjoint sources in SU(N) in lattice simulations is expected to saturate into a state of two `gluelumps' due to gluonic screening. We examine this in SU(2) in 2+1 dimensions.
Albanese +20 more
core +1 more source
Multimodal Data‐Driven Microstructure Characterization
A self‐consistent autonomous workflow for EBSP‐based microstructure segmentation by integrating PCA, GMM clustering, and cNMF with information‐theoretic parameter selection, requiring no user input. An optimal ROI size related to characteristic grain size is identified.
Qi Zhang +4 more
wiley +1 more source
Fuzzing With Optimized Grammar-Aware Mutation Strategies
Fuzzing is a widely used technique to discover vulnerabilities in software. However, for programs requiring highly structured inputs, the byte-based mutation strategies in existing fuzzers have difficulties in generating valid inputs.
Jiale Deng +5 more
doaj +1 more source
SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of an application is significantly higher than the respective average case for particular user-controlled inputs.
Betts A. +5 more
core +1 more source
A sequence‐encoded supramolecular construct containing two accessible toeholds is developed herein for enabling multiple editing operations. By introducing specific input strands, it is possible to selectively erase or rewrite digital content through parallel or series toehold‐mediated strand displacement (PTMSD or STMSD).
Jakub Ossowski +3 more
wiley +1 more source
Bare-Metal Firmware Fuzzing: A Survey of Techniques and Approaches
Firmware attacks are increasingly prevalent, often serving as low-hanging fruit for attackers due to the challenges of firmware security analysis. The complexity of hardware systems, platform diversity, peripheral interactions, and asynchronous events ...
Asmita Asmita +4 more
doaj +1 more source
Recent Advances of Slip Sensors for Smart Robotics
This review summarizes recent progress in robotic slip sensors across mechanical, electrical, thermal, optical, magnetic, and acoustic mechanisms, offering a comprehensive reference for the selection of slip sensors in robotic applications. In addition, current challenges and emerging trends are identified to advance the development of robust, adaptive,
Xingyu Zhang +8 more
wiley +1 more source
Keyword Sensitive Fuzzing Method for Embedded Device Firmware [PDF]
The firmware of most embedded devices provides a Web interface,which is convenient for the users to configure and manage the devices.However,the security problems of these Web interfaces usually bring challenges to the security of embedded devices ...
SI Jianpeng, HONG Zheng, ZHOU Zhenji, CHEN Qian, LI Tao
doaj +1 more source

