Loading…
Loading…
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems: CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
Barredo, Jorge, Eceiza, Maialen, Flores, Jose Luis, Iturbe, Mikel
Published in International journal of information security (01.08.2025)
Published in International journal of information security (01.08.2025)
Get full text
Journal Article
Loading…
FunFuzz: A Function-Oriented Fuzzer for Smart Contract Vulnerability Detection with High Effectiveness and Efficiency
Ye, Mingxi, Nan, Yuhong, Dai, Hong-Ning, Yang, Shuo, Luo, Xiapu, Zheng, Zibin
Published in ACM transactions on software engineering and methodology (27.09.2024)
Published in ACM transactions on software engineering and methodology (27.09.2024)
Get full text
Journal Article
Loading…
A Novel Vulnerability‐Detection Method Based on the Semantic Features of Source Code and the LLVM Intermediate Representation
Chen, Jinfu, Zhou, Jiapeng, Lin, Wei, Towey, Dave, Cai, Saihua, Chen, Haibo, Chen, Jingyi, Yin, Yemin
Published in Journal of software : evolution and process (01.05.2025)
Published in Journal of software : evolution and process (01.05.2025)
Get full text
Journal Article
Loading…
EXVul: Toward Effective and Explainable Vulnerability Detection for IoT Devices
Cao, Sicong, Sun, Xiaobing, Liu, Wei, Wu, Di, Zhang, Jiale, Li, Yan, Luan, Tom H., Gao, Longxiang
Published in IEEE internet of things journal (15.06.2024)
Published in IEEE internet of things journal (15.06.2024)
Get full text
Journal Article
Loading…
Assessing the Effectiveness of Vulnerability Detection via Prompt Tuning: An Empirical Study
Lu, Guilong, Ju, Xiaolin, Chen, Xiang, Yang, Shaoyu, Chen, Liang, Shen, Hao
Published in Proceedings / Asia Pacific Software Engineering Conference (04.12.2023)
Published in Proceedings / Asia Pacific Software Engineering Conference (04.12.2023)
Get full text
Conference Proceeding
Loading…
Design and development of a large language model-based tool for vulnerability detection
Zhuravchak, Anastasiia, Piskozub, Andrian, Skorynovych, Bohdan, Lakh, Yuriy, Zhuravchak, Danyil, Hlushchenko, Pavlo, Venherskyi, Petro, Beliaiev, Igor, Vorokhob, Maksym, Kolbasynskyi, Ivan
Published in Eastern-European journal of enterprise technologies (22.04.2025)
Published in Eastern-European journal of enterprise technologies (22.04.2025)
Get full text
Journal Article
Loading…
A memory-related vulnerability detection approach based on vulnerability model with Petri Net
Chen, Jinfu, Zhang, Chi, Cai, Saihua, Zhang, Lin, Ma, Liang
Published in Journal of logical and algebraic methods in programming (01.04.2023)
Published in Journal of logical and algebraic methods in programming (01.04.2023)
Get full text
Journal Article
Loading…
Coverage-Based Greybox Fuzzing as Markov Chain
Bohme, Marcel, Van-Thuan Pham, Roychoudhury, Abhik
Published in IEEE transactions on software engineering (01.05.2019)
Published in IEEE transactions on software engineering (01.05.2019)
Get full text
Journal Article
Loading…
Loading…
A formalization-based vulnerability detection method for cross-subject network components
Chen, Jinfu, Xie, Haodi, Cai, Saihua, Geng, Ye, Yin, Yemin, Zhang, Zikang
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)
Published in IEEE ... International Conference on Trust, Security and Privacy in Computing and Communications (Online) (01.12.2022)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…