Results 31 to 40 of about 5,262 (215)

IoT‐DeepSense: Behavioral Security Detection of IoT Devices Based on Firmware Virtualization and Deep Learning

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Recently, IoT devices have become the targets of large‐scale cyberattacks, and their security issues have been increasingly serious. However, due to the limited memory and battery power of IoT devices, it is hardly possible to install traditional security software, such as antivirus software for security defense.
Jin Wang   +7 more
wiley   +1 more source

SpotFuzzer: Static Instrument and Fuzzing Windows COTs

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The security research on Windows has received little attention in the academic circle. Most of the new methods are usually designed for the Linux system and are difficult to transplant to Windows. Fuzzing for Windows programs always suffers from its closed source.
Yeming Gu   +5 more
wiley   +1 more source

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Due to multitudinous vulnerabilities in sophisticated software programs, the detection performance of existing approaches requires further improvement. Multiple vulnerability detection approaches have been proposed to aid code inspection. Among them, there is a line of approaches that apply deep learning (DL) techniques and achieve promising results ...
Xue Yuan   +4 more
wiley   +1 more source

An Experimental Nexos Laboratory Using Virtual Xinu [PDF]

open access: yes, 2011
The Nexos Project is a joint effort between Marquette University, the University of Buffalo, and the University of Mississippi to build curriculum materials and a supporting experimental laboratory for hands-on projects in computer systems courses.
Brylow, Dennis, Ruth, Paul
core   +2 more sources

RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This paper proposes a new method for router admin portal vulnerability mining fuzzing test (RW‐fuzzer: Router Web fuzzer). The mutation samples that generated by Boofuzz are used to construct the test sample set for fuzzy testing ...
Longjuan Wang   +4 more
wiley   +1 more source

Virtual Machines and Networks - Installation, Performance Study, Advantages and Virtualization Options [PDF]

open access: yes, 2011
The interest in virtualization has been growing rapidly in the IT industry because of inherent benefits like better resource utilization and ease of system manageability.
Ali, Ishtiaq, Meghanathan, Natarajan
core   +1 more source

Automatically bridging the semantic gap in machine introspection [PDF]

open access: yes, 2016
Disclosed are various embodiments that facilitate automatically bridging the semantic gap in machine introspection. It may be determined that a program executed by a first virtual machine is requested to introspect a second virtual machine. A system call
Fu, Yangchun, Lin, Zhiqiang
core   +1 more source

CyberGuarder: a virtualization security assurance architecture for green cloud computing [PDF]

open access: yes, 2012
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security ...
Ashlesha   +16 more
core   +3 more sources

Deterministic replay specifics in case of minimal device set

open access: yesТруды Института системного программирования РАН, 2018
The deterministic replay technique can be used for debugging, improving reliability and robustness, software development and incident investigation (including reverse engineering of malware). The paper describes the implementation of deterministic replay
V. Y. Efimov   +2 more
doaj   +1 more source

Reducing the complexity of virtual machine networking [PDF]

open access: yes, 2016
Virtualization is an enabling technology that improves scalability, reliability, and flexibility. Virtualized networking is tackled by emulating or paravirtualizing network interface cards.
Barron, Jason   +10 more
core   +2 more sources

Home - About - Disclaimer - Privacy