Journal articles on the topic 'Model fuzzing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Model fuzzing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pan, Yan, Wei Lin, Liang Jiao, and Yuefei Zhu. "Model-Based Grey-Box Fuzzing of Network Protocols." Security and Communication Networks 2022 (May 5, 2022): 1–13. http://dx.doi.org/10.1155/2022/6880677.
Full textYang, Yixiao. "Improve Model Testing by Integrating Bounded Model Checking and Coverage Guided Fuzzing." Electronics 12, no. 7 (2023): 1573. http://dx.doi.org/10.3390/electronics12071573.
Full textZhang, Yifan, Kailong Zhu, Jie Peng, Yuliang Lu, Qian Chen, and Zixiong Li. "StatePre: A Large Language Model-Based State-Handling Method for Network Protocol Fuzzing." Electronics 14, no. 10 (2025): 1931. https://doi.org/10.3390/electronics14101931.
Full textLin, Mingmin, Yingpei Zeng, and Yang Li. "RegFuzz: A Linear Regression-Based Approach for Seed Scheduling in Directed Fuzzing." Electronics 12, no. 17 (2023): 3650. http://dx.doi.org/10.3390/electronics12173650.
Full textZhu, Xue Yong, and Zhi Yong Wu. "A New Fuzzing Technique Using Niche Genetic Algorithm." Advanced Materials Research 756-759 (September 2013): 4050–58. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4050.
Full textCheng, Mingjie, Kailong Zhu, Yuanchao Chen, Yuliang Lu, Chiyu Chen, and Jiayi Yu. "Reinforcement Learning-Based Multi-Phase Seed Scheduling for Network Protocol Fuzzing." Electronics 13, no. 24 (2024): 4962. https://doi.org/10.3390/electronics13244962.
Full textWang, Yunzhi, and Yufeng Li. "DCGFuzz: An Embedded Firmware Security Analysis Method with Dynamically Co-Directional Guidance Fuzzing." Electronics 13, no. 8 (2024): 1433. http://dx.doi.org/10.3390/electronics13081433.
Full textXie, Yuchong, Wenhui Zhang, and Dongdong She. "ZTaint-Havoc: From Havoc Mode to Zero-Execution Fuzzing-Driven Taint Inference." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 917–39. https://doi.org/10.1145/3728916.
Full textMuduli, Sujit Kumar, and Subhajit Roy. "Satisfiability modulo fuzzing: a synergistic combination of SMT solving and fuzzing." Proceedings of the ACM on Programming Languages 6, OOPSLA2 (2022): 1236–63. http://dx.doi.org/10.1145/3563332.
Full textBöhme, Marcel, Valentin J. M. Manès, and Sang Kil Cha. "Boosting Fuzzer Efficiency: An Information Theoretic Perspective." Communications of the ACM 66, no. 11 (2023): 89–97. http://dx.doi.org/10.1145/3611019.
Full textDu, Chunlai, Zhijian Cui, Yanhui Guo, Guizhi Xu, and Zhongru Wang. "MemConFuzz: Memory Consumption Guided Fuzzing with Data Flow Analysis." Mathematics 11, no. 5 (2023): 1222. http://dx.doi.org/10.3390/math11051222.
Full textChen, Juxing, Yuanchao Chen, Zulie Pan, et al. "DynER: Optimized Test Case Generation for Representational State Transfer (REST)ful Application Programming Interface (API) Fuzzers Guided by Dynamic Error Responses." Electronics 13, no. 17 (2024): 3476. http://dx.doi.org/10.3390/electronics13173476.
Full textLi, Xiaoting, Xiao Liu, Lingwei Chen, Rupesh Prajapati, and Dinghao Wu. "ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 11 (2022): 12559–65. http://dx.doi.org/10.1609/aaai.v36i11.21527.
Full textKim, Minho, Seongbin Park, Jino Yoon, Minsoo Kim, and Bong-Nam Noh. "File Analysis Data Auto-Creation Model For Peach Fuzzing." Journal of the Korea Institute of Information Security and Cryptology 24, no. 2 (2014): 327–33. http://dx.doi.org/10.13089/jkiisc.2014.24.2.327.
Full textTeplyuk, Pavel A., and Alexey G. Yakunin. "Methodology for fuzzing Linux kernel system calls using large language models." Proceedings of Tomsk State University of Control Systems and Radioelectronics 27, no. 3 (2024): 85–91. https://doi.org/10.21293/1818-0442-2024-27-3-85-91.
Full textDu, Chunlai, Yanhui Guo, Yifan Feng, and Shijie Zheng. "HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis." Electronics 13, no. 10 (2024): 1909. http://dx.doi.org/10.3390/electronics13101909.
Full textXu, Haoran, Yongjun Wang, Zhiyuan Jiang, Shuhui Fan, Shaojing Fu, and Peidai Xie. "Fuzzing JavaScript engines with a syntax-aware neural program model." Computers & Security 144 (September 2024): 103947. http://dx.doi.org/10.1016/j.cose.2024.103947.
Full textZhang, Zhiyu, Longxing Li, Ruigang Liang, and Kai Chen. "Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 848–70. https://doi.org/10.1145/3728913.
Full textLiu, Yuying, Pin Yang, Peng Jia, Ziheng He, and Hairu Luo. "MalFuzz: Coverage-guided fuzzing on deep learning-based malware classification model." PLOS ONE 17, no. 9 (2022): e0273804. http://dx.doi.org/10.1371/journal.pone.0273804.
Full textKlimis, Vasileios, Jack Clark, Alan Baker, David Neto, John Wickerson, and Alastair F. Donaldson. "Taking Back Control in an Intermediate Representation for GPU Computing." Proceedings of the ACM on Programming Languages 7, POPL (2023): 1740–69. http://dx.doi.org/10.1145/3571253.
Full textBorcherding, Anne, Martin Morawetz, and Steffen Pfrang. "Smarter Evolution: Enhancing Evolutionary Black Box Fuzzing with Adaptive Models." Sensors 23, no. 18 (2023): 7864. http://dx.doi.org/10.3390/s23187864.
Full textSong, Guang Jun, Chun Lan Zhao, and Ming Li. "Study on Software Vulnerability Dynamic Discovering System." Applied Mechanics and Materials 151 (January 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.
Full textGuan, Quan Long, Guo Xiang Yao, Kai Bin Ni, and Mei Xiu Zhou. "Research on Fuzzing Test Data Engine for Web Vulnerability." Advanced Materials Research 211-212 (February 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.
Full textZong, Xuejun, Wenjie Luo, Bowei Ning, Kan He, Lian Lian, and Yifei Sun. "DiffusionFuzz: Fuzzing Framework of Industrial Control Protocols Based on Denoising Diffusion Probabilistic Model." IEEE Access 12 (2024): 67795–808. http://dx.doi.org/10.1109/access.2024.3399820.
Full textZeng, Yingpei, Mingmin Lin, Shanqing Guo, et al. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols." Sensors 20, no. 18 (2020): 5194. http://dx.doi.org/10.3390/s20185194.
Full textGao, Sudi, Yueying Luo, and Tan Yang. "Research on River Water Environmental Capacity Based on Triangular Fuzzy Technology." E3S Web of Conferences 236 (2021): 03018. http://dx.doi.org/10.1051/e3sconf/202123603018.
Full textSong, Xuyan, Ruxian Zhang, Qingqing Dong, and Baojiang Cui. "Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities." Applied Sciences 13, no. 4 (2023): 2482. http://dx.doi.org/10.3390/app13042482.
Full textOkokpujie, Kennedy, Grace Chinyere Kennedy, Vingi Patrick Nzanzu, Mbasa Joaquim Molo, Emmanuel Adetiba, and Joke Badejo. "ANOMALY-BASED INTRUSION DETECTION FOR A VEHICLE CAN BUS: A CASE FOR HYUNDAI AVANTE CN7." Journal of Southwest Jiaotong University 56, no. 5 (2021): 144–56. http://dx.doi.org/10.35741/issn.0258-2724.56.5.14.
Full textBrooker, Marc, and Ankush Desai. "Systems Correctness Practices at AWS." Queue 22, no. 6 (2024): 79–96. https://doi.org/10.1145/3712057.
Full textDong, Guofang, Pu Sun, Wenbo Shi, and Chang Choi. "A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems." Applied Soft Computing 70 (September 2018): 896–902. http://dx.doi.org/10.1016/j.asoc.2018.02.036.
Full textSong, Yahui, Xiang Gao, Wenhua Li, Wei-Ngan Chin, and Abhik Roychoudhury. "ProveNFix: Temporal Property-Guided Program Repair." Proceedings of the ACM on Software Engineering 1, FSE (2024): 226–48. http://dx.doi.org/10.1145/3643737.
Full textDai, Xinghua, Shengrong Gong, Shan Zhong, and Zongming Bao. "Bilinear CNN Model for Fine-Grained Classification Based on Subcategory-Similarity Measurement." Applied Sciences 9, no. 2 (2019): 301. http://dx.doi.org/10.3390/app9020301.
Full textWang, Xiandong, Jianmin He, and Shouwei Li. "Compound Option Pricing under Fuzzy Environment." Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/875319.
Full textNayak, Prerana, Vanditha M, and Sanjay Tippannavar. "Smart Intrusion Detection System for CAN Network Implemented using LSTM Strategy." International Journal of Innovative Research in Advanced Engineering 10, no. 03 (2023): 98–105. http://dx.doi.org/10.26562/ijirae.2023.v1003.08.
Full textKim, Taeguen, Jiyoon Kim, and Ilsun You. "An Anomaly Detection Method Based on Multiple LSTM-Autoencoder Models for In-Vehicle Network." Electronics 12, no. 17 (2023): 3543. http://dx.doi.org/10.3390/electronics12173543.
Full textLiu, Xiao, Xiaoting Li, Rupesh Prajapati, and Dinghao Wu. "DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.
Full textWang, Enze, Wei Xie, Shuhuan Li, et al. "Large Language Model-Powered Protected Interface Evasion: Automated Discovery of Broken Access Control Vulnerabilities in Internet of Things Devices." Sensors 25, no. 9 (2025): 2913. https://doi.org/10.3390/s25092913.
Full textAhmadi-Pour, Sallar, Mathis Logemann, Vladimir Herdt, and Rolf Drechsler. "Synergistic Verification of Hardware Peripherals through Virtual Prototype Aided Cross-Level Methodology Leveraging Coverage-Guided Fuzzing and Co-Simulation." Chips 2, no. 3 (2023): 195–208. http://dx.doi.org/10.3390/chips2030012.
Full textSu, Xing, Hanzhong Liang, Hao Wu, Ben Niu, Fengyuan Xu, and Sheng Zhong. "DiSCo: Towards Decompiling EVM Bytecode to Source Code using Large Language Models." Proceedings of the ACM on Software Engineering 2, FSE (2025): 2311–34. https://doi.org/10.1145/3729373.
Full textBasavaraj, Dheeraj, and Shahab Tayeb. "Towards a Lightweight Intrusion Detection Framework for In-Vehicle Networks." Journal of Sensor and Actuator Networks 11, no. 1 (2022): 6. http://dx.doi.org/10.3390/jsan11010006.
Full textSharkov, Ivan Vladimirovich. "Protocol automata recovery method using binary code." Proceedings of the Institute for System Programming of the RAS 34, no. 5 (2022): 43–62. http://dx.doi.org/10.15514/ispras-2022-34(5)-3.
Full textWang, Ziqi, Debao Bu, Weihan Tian, and Baojiang Cui. "Analyzing and Discovering Spatial Algorithm Complexity Vulnerabilities in Recursion." Applied Sciences 14, no. 5 (2024): 1855. http://dx.doi.org/10.3390/app14051855.
Full textHajar Halili, Siti, Norharyanti Mohsin, Zamzami Zainuddin, Juliana Othman, and Shukri Sulaiman. "Designing the open-badges guideline based on the fuzzy Delphi method." Edelweiss Applied Science and Technology 8, no. 4 (2024): 1841–55. http://dx.doi.org/10.55214/25768484.v8i4.1556.
Full textChen, Fan, Gengsheng He, Shun Dong, et al. "Space-Time Effect Prediction of Blasting Vibration Based on Intelligent Automatic Blasting Vibration Monitoring System." Applied Sciences 12, no. 1 (2021): 12. http://dx.doi.org/10.3390/app12010012.
Full textDraissi, Oussama, Tobias Cloosters, David Klein, et al. "Wemby’s Web: Hunting for Memory Corruption in WebAssembly." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 1326–49. https://doi.org/10.1145/3728937.
Full textZhang, Yujian, and Daifu Liu. "Toward Vulnerability Detection for Ethereum Smart Contracts Using Graph-Matching Network." Future Internet 14, no. 11 (2022): 326. http://dx.doi.org/10.3390/fi14110326.
Full textPandhare, Harshad Vijay. "From Test Case Design to Test Data Generation: How AI is Redefining QA Processes." International Journal of Engineering and Computer Science 13, no. 12 (2024): 26737–57. https://doi.org/10.18535/ijecs.v13i12.4956.
Full textTereshchenko, Oleksandr I. "Integration of NLP and machine learning methods for smart contract security: a comparison with traditional approaches." Informatics. Culture. Technology 1, no. 1 (2024): 207–11. http://dx.doi.org/10.15276/ict.01.2024.31.
Full textGuan, Hao, Guangdong Bai, and Yepang Liu. "CrossProbe: LLM-Empowered Cross-Project Bug Detection for Deep Learning Frameworks." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 2430–52. https://doi.org/10.1145/3728984.
Full textCheng, Mingjie, Kailong Zhu, Yuanchao Chen, Guozheng Yang, Yuliang Lu, and Canju Lu. "MSFuzz: Augmenting Protocol Fuzzing with Message Syntax Comprehension via Large Language Models." Electronics 13, no. 13 (2024): 2632. http://dx.doi.org/10.3390/electronics13132632.
Full text