Literatura académica sobre el tema "Model fuzzing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Model fuzzing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Model fuzzing"
Zhu, Xue Yong y Zhi Yong Wu. "A New Fuzzing Technique Using Niche Genetic Algorithm". Advanced Materials Research 756-759 (septiembre de 2013): 4050–58. http://dx.doi.org/10.4028/www.scientific.net/amr.756-759.4050.
Texto completoKim, Minho, Seongbin Park, Jino Yoon, Minsoo Kim y Bong-Nam Noh. "File Analysis Data Auto-Creation Model For Peach Fuzzing". Journal of the Korea Institute of Information Security and Cryptology 24, n.º 2 (30 de abril de 2014): 327–33. http://dx.doi.org/10.13089/jkiisc.2014.24.2.327.
Texto completoSong, Guang Jun, Chun Lan Zhao y Ming Li. "Study on Software Vulnerability Dynamic Discovering System". Applied Mechanics and Materials 151 (enero de 2012): 673–77. http://dx.doi.org/10.4028/www.scientific.net/amm.151.673.
Texto completoGuan, Quan Long, Guo Xiang Yao, Kai Bin Ni y Mei Xiu Zhou. "Research on Fuzzing Test Data Engine for Web Vulnerability". Advanced Materials Research 211-212 (febrero de 2011): 500–504. http://dx.doi.org/10.4028/www.scientific.net/amr.211-212.500.
Texto completoZeng, Yingpei, Mingmin Lin, Shanqing Guo, Yanzhao Shen, Tingting Cui, Ting Wu, Qiuhua Zheng y Qiuhua Wang. "MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols". Sensors 20, n.º 18 (11 de septiembre de 2020): 5194. http://dx.doi.org/10.3390/s20185194.
Texto completoGao, Sudi, Yueying Luo y Tan Yang. "Research on River Water Environmental Capacity Based on Triangular Fuzzy Technology". E3S Web of Conferences 236 (2021): 03018. http://dx.doi.org/10.1051/e3sconf/202123603018.
Texto completoDong, Guofang, Pu Sun, Wenbo Shi y Chang Choi. "A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems". Applied Soft Computing 70 (septiembre de 2018): 896–902. http://dx.doi.org/10.1016/j.asoc.2018.02.036.
Texto completoDai, Xinghua, Shengrong Gong, Shan Zhong y Zongming Bao. "Bilinear CNN Model for Fine-Grained Classification Based on Subcategory-Similarity Measurement". Applied Sciences 9, n.º 2 (16 de enero de 2019): 301. http://dx.doi.org/10.3390/app9020301.
Texto completoWang, Xiandong, Jianmin He y Shouwei Li. "Compound Option Pricing under Fuzzy Environment". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/875319.
Texto completoLiu, Xiao, Xiaoting Li, Rupesh Prajapati y Dinghao Wu. "DeepFuzz: Automatic Generation of Syntax Valid C Programs for Fuzz Testing". Proceedings of the AAAI Conference on Artificial Intelligence 33 (17 de julio de 2019): 1044–51. http://dx.doi.org/10.1609/aaai.v33i01.33011044.
Texto completoTesis sobre el tema "Model fuzzing"
Duchene, Fabien. "Detection of web vulnerabilities via model inference assisted evolutionary fuzzing". Thesis, Grenoble, 2014. http://www.theses.fr/2014GRENM022/document.
Texto completoTesting is a viable approach for detecting implementation bugs which have a security impact, a.k.a. vulnerabilities. When the source code is not available, it is necessary to use black-box testing techniques. We address the problem of automatically detecting a certain class of vulnerabilities (Cross Site Scripting a.k.a. XSS) in web applications in a black-box test context. We propose an approach for inferring models of web applications and fuzzing from such models and an attack grammar. We infer control plus taint flow automata, from which we produce slices, which narrow the fuzzing search space. Genetic algorithms are then used to schedule the malicious inputs which are sent to the application. We incorporate a test verdict by performing a double taint inference on the browser parse tree and combining this with taint aware vulnerability patterns. Our implementations LigRE and KameleonFuzz outperform current open-source black-box scanners. We discovered 0-day XSS (i.e., previously unknown vulnerabilities) in web applications used by millions of users
Venger, Adam. "Black-box analýza zabezpečení Wi-Fi". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445533.
Texto completoAhmad, Abbas. "Model-Based Testing for IoT Systems : Methods and tools". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD008/document.
Texto completoThe Internet of Things (IoT) is nowadays globally a mean of innovation and transformation for many companies. Applications extend to a large number of domains, such as smart cities, smart homes, healthcare, etc. The Gartner Group estimates an increase up to 21 billion connected things by 2020. The large span of "things" introduces problematic aspects, such as conformance and interoperability due to the heterogeneity of communication protocols and the lack of a globally-accepted standard. The large span of usages introduces problems regarding secure deployments and scalability of the network over large-scale infrastructures. This thesis deals with the problem of the validation of the Internet of Things to meet the challenges of IoT systems. For that, we propose an approach using the generation of tests from models (MBT). We have confronted this approach through multiple experiments using real systems thanks to our participation in international projects. The important effort which is needed to be placed on the testing aspects reminds every IoT system developer that doing nothing is more expensive later on than doing it on the go
Lone, Sang Fernand. "Protection des systèmes informatiques contre les attaques par entrées-sorties". Phd thesis, INSA de Toulouse, 2012. http://tel.archives-ouvertes.fr/tel-00863020.
Texto completoLiao, Feng-Ze y 廖峰澤. "Browser Fuzzing by Scheduled Mutation and Generation of Document Object Models". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/34522736060995439796.
Texto completo國立交通大學
網路工程研究所
103
Internet applications have made our daily life fruitful. However, they also cause many security problems if these applications are leveraged by intruders. Thus, it is important to find and fix vulnerabilities timely to prevent application vulnerabilities from being exploited. Fuzz testing is a popular methodology that effectively finds vulnerabilities in application programs with seed input mutation. However, it is not a satisfied solution for the web browsers. In this work, we propose a solution, called scheduled DOM fuzzing (SDF), which integrates several related browser fuzzing tools and the fuzzing framework called BFF. To explore more crash possibilities, we revise the browser fuzzing architecture and schedule seed input selection and mutation dynamically. We also propose two probability computing methods in scheduling mechanism which tries to improve the performance by determining which combinations of seed and mutation would produce more crashes. Our experiments show that SDF is 2.27 time more efficient in terms of the number of crashes and vulnerabilities found at most. SDF also has the capacity for finding 23 exploitable crashes in Windows 7 within five days. The experimental results reveals that a good scheduling method for seed and mutations in browser fuzzing is able to find more exploitable crashes than fuzzers with the fixed seed input.
Libros sobre el tema "Model fuzzing"
Wikert, Steven Micheal. Cherish me always: Teddy bears & warm fuzzies : antique photographs of children with stuffed animals. Grantsville, Md: Hobby House Press, 2001.
Buscar texto completoWikert, Steven Micheal y Mary McMurray Wikert. Teddy Bears & Warm Fuzzies: Antique Photographs of Children with Stuffed Animals. Hobby House Press, 2001.
Buscar texto completoCapítulos de libros sobre el tema "Model fuzzing"
Chen, Chen, Zhouguo Chen, Yongle Hao y Baojiang Cui. "Mocov: Model Based Fuzzing Through Coverage Guided Technology". En Advances on Broad-Band Wireless Computing, Communication and Applications, 404–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69811-3_37.
Texto completoWidl, Magdalena. "Test Case Generation by Grammar-Based Fuzzing for Model-Driven Engineering". En Hardware and Software: Verification and Testing, 278–79. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39611-3_28.
Texto completoChen, Yixiong, Yang Yang, Zhanyao Lei, Mingyuan Xia y Zhengwei Qi. "Bootstrapping Automated Testing for RESTful Web Services". En Fundamental Approaches to Software Engineering, 46–66. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_3.
Texto completoAlshmrany, Kaled M., Rafael S. Menezes, Mikhail R. Gadelha y Lucas C. Cordeiro. "FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution)". En Fundamental Approaches to Software Engineering, 363–67. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-71500-7_19.
Texto completoIdowu, Peter Adebayo, Sarumi Olusegun Ajibola, Jeremiah Ademola Balogun y Oluwadare Ogunlade. "Development of a Fuzzy Logic-Based Model for Monitoring Cardiovascular Risk". En Coronary and Cardiothoracic Critical Care, 172–90. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8185-7.ch009.
Texto completoJaggi, Chandra K., Bimal Kumar Mishra y T. C. Panda. "A Fuzzy EOQ Model for Deteriorating Items With Allowable Shortage and Inspection Under the Trade Credit". En Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 233–49. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch014.
Texto completoChakraborti, Debjani, Valentina E. Balas y Bijay Baran Pal. "Genetic Algorithm for FGP Model of a Multiobjective Bilevel Programming Problem in Uncertain Environment". En Handbook of Research on Natural Computing for Optimization Problems, 870–88. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch035.
Texto completoKumar, Mousumi, Valentina E. Balas y Bijay Baran Pal. "Using Fuzzy Goal Programming with Penalty Functions for Solving EEPGD Problem via Genetic Algorithm". En Handbook of Research on Natural Computing for Optimization Problems, 847–69. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0058-2.ch034.
Texto completoSaha, Sumana y Tripti Chakrabarti. "Imprecise Inventory Model for Items With Imperfect Quality Subject to Learning Effects Having Shortages". En Handbook of Research on Promoting Business Process Improvement Through Inventory Control Techniques, 284–304. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3232-3.ch016.
Texto completo"Development of Fuzzy Multi-Objective Stochastic Fractional Programming Models". En Multi-Objective Stochastic Programming in Fuzzy Environments, 128–76. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8301-1.ch004.
Texto completoActas de conferencias sobre el tema "Model fuzzing"
Schneider, Martin, Jurgen Grossmann, Ina Schieferdecker y Andrej Pietschker. "Online Model-Based Behavioral Fuzzing". En 2013 IEEE 6th International Conference On Software Testing, Verification and Validation Workshops (ICSTW). IEEE, 2013. http://dx.doi.org/10.1109/icstw.2013.61.
Texto completoWang, Jiajie, Puhan Zhang, Lei Zhang, Haowen Zhu y Xiaojun Ye. "A model-based fuzzing approach for DBMS". En 2013 8th International Conference on Communications and Networking in China (CHINACOM). IEEE, 2013. http://dx.doi.org/10.1109/chinacom.2013.6694634.
Texto completoPham, Van-Thuan, Marcel Böhme y Abhik Roychoudhury. "Model-based whitebox fuzzing for program binaries". En ASE'16: ACM/IEEE International Conference on Automated Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2970276.2970316.
Texto completoGao, Zicong, Weiyu Dong, Rui Chang y Chengwei Ai. "The Stacked Seq2seq-attention Model for Protocol Fuzzing". En 2019 IEEE 7th International Conference on Computer Science and Network Technology (ICCSNT). IEEE, 2019. http://dx.doi.org/10.1109/iccsnt47585.2019.8962499.
Texto completoHe, HuiHui y YongJun Wang. "PNFUZZ: A Stateful Network Protocol Fuzzing Approach Based on Packet Clustering". En 6th International Conference on Computer Science, Engineering And Applications (CSEA 2020). AIRCC Publishing Corporation, 2020. http://dx.doi.org/10.5121/csit.2020.101805.
Texto completoSun, Xiaoshan, Yu Fu, Yun Dong, Zhihao Liu y Yang Zhang. "Improving Fitness Function for Language Fuzzing with PCFG Model". En 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2018. http://dx.doi.org/10.1109/compsac.2018.00098.
Texto completoDuchene, Fabien, Roland Groz, Sanjay Rawat y Jean-Luc Richier. "XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing". En 2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2012. http://dx.doi.org/10.1109/icst.2012.181.
Texto completoWang, Jiajie, Tao Guo, Puhan Zhang y Qixue Xiao. "A Model-Based Behavioral Fuzzing Approach for Network Service". En 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC). IEEE, 2013. http://dx.doi.org/10.1109/imccc.2013.250.
Texto completoXu, Haoran, Yongjun Wang, Shuhui Fan, Peidai Xie y Aizhi Liu. "DSmith: Compiler Fuzzing through Generative Deep Learning Model with Attention". En 2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020. http://dx.doi.org/10.1109/ijcnn48605.2020.9206911.
Texto completoJohansson, William, Martin Svensson, Ulf E. Larson, Magnus Almgren y Vincenzo Gulisano. "T-Fuzz: Model-Based Fuzzing for Robustness Testing of Telecommunication Protocols". En 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST). IEEE, 2014. http://dx.doi.org/10.1109/icst.2014.45.
Texto completo