SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices (Englisch)
- Neue Suche nach: Li, Xixing
- Weitere Informationen zu Li, Xixing:
-
https://orcid.org/0000-0002-8309-8001
- Neue Suche nach: Zhao, Lei
- Neue Suche nach: Wei, Qiang
- Neue Suche nach: Wu, Zehui
- Neue Suche nach: Shi, Weiming
- Neue Suche nach: Wang, Yunchao
- Neue Suche nach: Li, Xixing
- Neue Suche nach: Zhao, Lei
- Neue Suche nach: Wei, Qiang
- Neue Suche nach: Wu, Zehui
- Neue Suche nach: Shi, Weiming
- Neue Suche nach: Wang, Yunchao
In:
Computers and Security
;
138
;
2023
-
ISSN:
- Aufsatz (Zeitschrift) / Elektronische Ressource
-
Titel:SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices
-
Beteiligte:Li, Xixing ( Autor:in ) / Zhao, Lei ( Autor:in ) / Wei, Qiang ( Autor:in ) / Wu, Zehui ( Autor:in ) / Shi, Weiming ( Autor:in ) / Wang, Yunchao ( Autor:in )
-
Erschienen in:Computers and Security ; 138
-
Verlag:
- Neue Suche nach: Elsevier Ltd
-
Erscheinungsdatum:20.11.2023
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Zeitschrift)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis – Band 138
Zeige alle Jahrgänge und Ausgaben
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
-
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devicesLi, Xixing / Zhao, Lei / Wei, Qiang / Wu, Zehui / Shi, Weiming / Wang, Yunchao et al. | 2023
-
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from ChinaTao, Shouzheng / Liu, Yezheng / Sun, Chunhua et al. | 2023
-
Improved privacy-preserving PCA using optimized homomorphic matrix multiplicationMa, Xirong / Ma, Chuan / Jiang, Yali / Ge, Chunpeng et al. | 2023
-
Editorial: Special issue on ARES 2022Coppa, Emilio / Schrittwieser, Sebastian et al. | 2023
-
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural networkWang, Maoli / Zang, Xiaodong / Cao, Jianbo / Zhang, Bowen / Li, Shengbao et al. | 2023
-
Unveiling encrypted traffic types through hierarchical network characteristicsChen, Yufan / Yang, Jiahai / Cui, Susu / Dong, Cong / Jiang, Bo / Liu, Yuling / Lu, Zhigang et al. | 2023
-
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfactionKruzikova, Agata / Muzik, Michal / Knapova, Lenka / Dedkova, Lenka / Smahel, David / Matyas, Vashek et al. | 2023
-
Corrigendum to “Survey: Automatic generation of attack trees and attack graphs” [Computers & Security Volume 137, February 2024, 103602]Konsta, Alyzia-Maria / Lluch Lafuente, Alberto / Spiga, Beatrice / Dragoni, Nicola et al. | 2023
-
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcingGong, Zhimao / Li, Junyi / Lin, Yaping / Yuan, Lening / Gao, Wen et al. | 2023
-
DDoS attack detection and mitigation using deep neural network in SDN environmentHnamte, Vanlalruata / Najar, Ashfaq Ahmad / Nhung-Nguyen, Hong / Hussain, Jamal / Sugali, Manohar Naik et al. | 2023
-
DDoS family: A novel perspective for massive types of DDoS attacksZhao, Ziming / Li, Zhaoxuan / Zhou, Zhihao / Yu, Jiongchi / Song, Zhuoxue / Xie, Xiaofei / Zhang, Fan / Zhang, Rui et al. | 2023
-
Editorial Board| 2024
-
Fortifying healthcare: An action research approach to developing an effective SETA programWilliams, Jason A. / Zafar, Humayun / Gupta, Saurabh et al. | 2023
-
Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533]Skeoch, Henry R.K. et al. | 2023
-
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future PerspectivesGuerra-Manzanares, Alejandro et al. | 2023
-
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysisXiao, Haitao / Zhu, Yan / Zhang, Bin / Lu, Zhigang / Du, Dan / Liu, Yuling et al. | 2023
-
Deception in double extortion ransomware attacks: An analysis of profitability and credibilityMeurs, Tom / Cartwright, Edward / Cartwright, Anna / Junger, Marianne / Abhishta, Abhishta et al. | 2023