supported by the major project of Science and Technology Innovation 2030,"The next generation of Artificial Intelligence"under Grant Number 2021ZD0111400;the Open project of the State Key Laboratory of Computer Architecture,Neural Network Enhanced Symbolic Execution Algorithm Research under Grant Number CARCH201910;the Fundamental Research Fundsfor the Central Universities under Grant Number 3132018XNG1814 and 3132018XNG1815.
The popularity of small office and home office routers has brought convenience,but it also caused many security issues due to vulnerabilities.Black-box fuzzing through network protocols to discover vulnerabilities bec...
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers c...
supported by the National Natural Science Foundation of China(No.62202320);the Fundamental Research Funds for the Central Universities(Nos.SCU2023D008,2023SCU12129);the Natural Science Foundation of Sichuan Province(No.2024NSFSC1449);the Science and Engineering Connotation Development Project of Sichuan University(No.2020SCUNG129);the Key Laboratory of Data Protection and Intelligent Management(Sichuan University),Ministry of Education.
RESTful API fuzzing is a promising method for automated vulnerability detection in Kubernetes platforms.Existing tools struggle with generating lengthy,high-semantic request sequences that can pass Kubernetes API gate...
supported in part by the National Natural Science Foundation of China under Grants 62273272,62303375,and 61873277;in part by the Key Research and Development Program of Shaanxi Province under Grant 2023-YBGY-243;in part by the Natural Science Foundation of Shaanxi Province under Grant 2020JQ-758;in part by the Youth Innovation Team of Shaanxi Universities,and in part by the Special Fund for Scientific and Technological Innovation Strategy of Guangdong Province under Grant 2022A0505030025.
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr...
This research was supported by National Key R&D Program of China(2022YFB3103900);National Natural Science Foundation of China(62032010,62202462);Strategic Priority Research Program of the CAS(XDC02030200).
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiveness.Mu...
This work was supported by the Ministry of Science and ICT(MSIT);Korea,under the Information Technology Research Center(ITRC)support program(IITP-2022-2018-0-01423);supervised by the Institute for Information&Communications Technology Planning&Evaluation(IITP);by MSIT,Korea under the ITRC support program(IITP-2021-2020-0-01602);supervised by the IITP.
Internet of things(IoT)devices are being increasingly used in numerous areas.However,the low priority on security and various IoT types have made these devices vulnerable to attacks.To prevent this,recent studies have...
This work is supported in part by Chinese National Natural Science Foundation(61802394,U1836209,62032010);Strategic Priority Research Program of theCAS(XDC02040100)。
Network function virtualization provides programmable in-network middlewares by leveraging virtualization tech-nologies and commodity hardware and has gained popularity among all mainstream network device manufacturer...