4   Artículos

 
en línea
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao    
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Kailong Zhu, Yuliang Lu, Hui Huang, Lu Yu and Jiazhen Zhao    
Control Flow Graphs (CFGs) provide fundamental data for many program analyses, such as malware analysis, vulnerability detection, code similarity analysis, etc. Existing techniques for constructing control flow graphs include static, dynamic, and hybrid ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »