Search Page
Save citations to file
Email citations
Send citations to clipboard
Add to Collections
Add to My Bibliography
Create a file for external citation management software
Your saved search
Your RSS Feed
Filters
Results by year
Table representation of search results timeline featuring number of search results per year.
Year | Number of Results |
---|---|
2017 | 2 |
2022 | 1 |
2024 | 0 |
Search Results
3 results
Results by year
Filters applied: . Clear all
Page 1
Did you mean
buzzing logic【社科】
(1 results)?
Coverage-guided differential testing of TLS implementations based on syntax mutation.
PLoS One. 2022 Jan 24;17(1):e0262176. doi: 10.1371/journal.pone.0262176. eCollection 2022.
PLoS One. 2022.
PMID: 35073360
Free PMC article.
This paper provides a solution to find the differences more efficiently by targeting the TLS protocol handshake process. The differences of different implementations during the fuzzing process, such as code coverage and response data, are taken to guide the mutation of tes …
This paper provides a solution to find the differences more efficiently by targeting the TLS protocol handshake process. The differences of …
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen S, Meng Q, Feng C, Tang C.
Wen S, et al.
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
PLoS One. 2017.
PMID: 29049409
Free PMC article.
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel ap …
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security …
Item in Clipboard
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
Wen S, Meng Q, Feng C, Tang C.
Wen S, et al.
PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017.
PLoS One. 2017.
PMID: 29145458
Free PMC article.
The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations....
The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detect …
Item in Clipboard
Cite
Cite