Results 31 to 40 of about 5,262 (215)
Recently, IoT devices have become the targets of large‐scale cyberattacks, and their security issues have been increasingly serious. However, due to the limited memory and battery power of IoT devices, it is hardly possible to install traditional security software, such as antivirus software for security defense.
Jin Wang +7 more
wiley +1 more source
SpotFuzzer: Static Instrument and Fuzzing Windows COTs
The security research on Windows has received little attention in the academic circle. Most of the new methods are usually designed for the Linux system and are difficult to transplant to Windows. Fuzzing for Windows programs always suffers from its closed source.
Yeming Gu +5 more
wiley +1 more source
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization
Due to multitudinous vulnerabilities in sophisticated software programs, the detection performance of existing approaches requires further improvement. Multiple vulnerability detection approaches have been proposed to aid code inspection. Among them, there is a line of approaches that apply deep learning (DL) techniques and achieve promising results ...
Xue Yuan +4 more
wiley +1 more source
An Experimental Nexos Laboratory Using Virtual Xinu [PDF]
The Nexos Project is a joint effort between Marquette University, the University of Buffalo, and the University of Mississippi to build curriculum materials and a supporting experimental laboratory for hands-on projects in computer systems courses.
Brylow, Dennis, Ruth, Paul
core +2 more sources
RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This paper proposes a new method for router admin portal vulnerability mining fuzzing test (RW‐fuzzer: Router Web fuzzer). The mutation samples that generated by Boofuzz are used to construct the test sample set for fuzzy testing ...
Longjuan Wang +4 more
wiley +1 more source
Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options [PDF]
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability.
Ali, Ishtiaq, Meghanathan, Natarajan
core +1 more source
Automatically bridging the semantic gap in machine introspection [PDF]
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core +1 more source
CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha +16 more
core +3 more sources
Deterministic replay specifics in case of minimal device set
The deterministic replay technique can be used for debugging, improving reliability and robustness, software development and incident investigation (including reverse engineering of malware). The paper describes the implementation of deterministic replay
V. Y. Efimov +2 more
doaj +1 more source
Reducing the complexity of virtual machine networking [PDF]
Virtualization is an enabling technology that improves scalability, reliability, and flexibility. Virtualized networking is tackled by emulating or paravirtualizing network interface cards.
Barron, Jason +10 more
core +2 more sources

