Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Results by year

Table representation of search results timeline featuring number of search results per year.

Year Number of Results
2017 2
2022 1
2024 0

Text availability

Article attribute

Article type

Publication date

Search Results

3 results

Results by year

Filters applied: . Clear all
Page 1
Did you mean buzzing logic【社科】 (1 results)?
Coverage-guided differential testing of TLS implementations based on syntax mutation.
Pan Y, Lin W, He Y, Zhu Y. Pan Y, et al. PLoS One. 2022 Jan 24;17(1):e0262176. doi: 10.1371/journal.pone.0262176. eCollection 2022. PLoS One. 2022. PMID: 35073360 Free PMC article.
This paper provides a solution to find the differences more efficiently by targeting the TLS protocol handshake process. The differences of different implementations during the fuzzing process, such as code coverage and response data, are taken to guide the mutation of tes …
This paper provides a solution to find the differences more efficiently by targeting the TLS protocol handshake process. The differences of …
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.
Wen S, Meng Q, Feng C, Tang C. Wen S, et al. PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017. PLoS One. 2017. PMID: 29049409 Free PMC article.
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security, and network intrusion detection. In this study, by analyzing the general fuzzing method of network protocols, we propose a novel ap …
Network protocol vulnerability detection plays an important role in many domains, including protocol security analysis, application security …
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.
Wen S, Meng Q, Feng C, Tang C. Wen S, et al. PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017. PLoS One. 2017. PMID: 29145458 Free PMC article.
The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations....
The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detect …