Results 241 to 250 of about 372,889 (280)
Some of the next articles are maybe not open access.
Improving Vulnerability Scanner Performance in Detecting AJAX Application Vulnerabilities
2019 International Conference on Data and Software Engineering (ICoDSE), 2019The development of internet and web application gave birth to a new technology called AJAX. Web application utilizes this technology and create a new trend in web application – AJAX application. As a web application, there are some security issues related to AJAX application, one of which is the existence of web application vulnerabilities.
Kevin Jonathan Koswara +1 more
openaire +1 more source
Detecting security vulnerabilities with vulnerability nets
Journal of Systems and Software, 2022Pingyan Wang +3 more
openaire +1 more source
Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers
2015 International Conference on Information Technology (ICIT), 2015There has been a rampant surge in compromise of consumer grade small scale routers in the last couple of years. Attackers are able to manipulate the Domain Name Space (DNS) settings of these devices hence making them capable of initiating different man-in-the-middle attacks.
Prabaharan Poornachandran +5 more
openaire +1 more source
Reversing to detect software vulnerabilities
2017 12th Iberian Conference on Information Systems and Technologies (CISTI), 2017Security is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software.
Bruno Goncalves de Oliveira +2 more
openaire +1 more source
Semantic-Aware Vulnerability Detection
2022 IEEE International Conference on Cyber Security and Resilience (CSR), 2022Zhen Huang, Marc White
openaire +1 more source
Vulnerability Detection in Android
Android is a market-leading, open-source operating system. It is utilized not only in mobile phones, but also in smart TVs, smart TV boxes, and smart vehicles. Despite its substantial market share, it has significant security problems. For example, how to prevent attackers from taking control of the Android system, how to determine if spyware is ...openaire +1 more source
LLM-based Vulnerability Detection
2023 International Conference on Human-Centered Cognitive Systems (HCCS), 2023Hongping Li, Li Shan
openaire +1 more source
Detect Vulnerabilities Utilizing Fuzzing
Software security is critical to the industry as well as people’s daily life. In order to prevent security issues, a practical solution is to develop a system that can detect bugs before deployment. Nowadays, fuzzing is one of the most successful techniques for bug discovery, which have already found tens of thousands of bugs in real-world applications.openaire +1 more source
MVDetecter: Vulnerability Primitive-based General Memory Vulnerability Detection
2022 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 2022Xiaofan Nie +5 more
openaire +1 more source
Integrative oncology: Addressing the global challenges of cancer prevention and treatment
Ca-A Cancer Journal for Clinicians, 2022Jun J Mao,, Msce +2 more
exaly

