Flash vulnerability detection based on virtual execution and branch coverage

被引:0
|
作者
机构
[1] Peng, Cheng
[2] Duan, Guihua
[3] Wang, Xiangxin
[4] Dong, Pingping
[5] Guo, Kehua
来源
Duan, G. (duangh@csu.edu.cn) | 1600年 / Central South University of Technology卷 / 44期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A model-guided symbolic execution approach for network protocol implementations and vulnerability detection
    Wen, Shameng
    Meng, Qingkun
    Feng, Chao
    Tang, Chaojing
    PLOS ONE, 2017, 12 (11):
  • [42] Path Sensitive Static Analysis of Web Applications for Remote Code Execution Vulnerability Detection
    Zheng, Yunhui
    Zhang, Xiangyu
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 652 - 661
  • [43] Virtual Coverage: A New Approach to Coverage-Based Software Reliability Engineering
    Park, Joong-Yang
    Lee, Gyemin
    COMMUNICATIONS FOR STATISTICAL APPLICATIONS AND METHODS, 2013, 20 (06) : 467 - 474
  • [44] Ontology-based modeling and execution of workflows for Virtual ISP
    Pop, Daniel
    Fortis, Teodor-Florin
    Negru, Viorel
    CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 1007 - 1011
  • [45] Virtual Gateway in TCMS Execution Environment based on an Integrated Architecture
    Fang, Hongjie
    Obermaisser, Roman
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 524 - 531
  • [46] Execution replay of the entire operating system based on virtual machine
    Wu, Yan-Jun
    Zhou, Peng
    Yu, Jia-Geng
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (SUPPL. 2): : 134 - 141
  • [47] Detection of Unlink Attack Based on Symbolic Execution
    Huang N.
    Huang S.
    Liang Z.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2018, 46 (08): : 81 - 87
  • [48] HotCFuzz: Enhancing Vulnerability Detection through Fuzzing and Hotspot Code Coverage Analysis
    Du, Chunlai
    Guo, Yanhui
    Feng, Yifan
    Zheng, Shijie
    ELECTRONICS, 2024, 13 (10)
  • [49] Flash controller-based secure execution environment for protecting code confidentiality
    Zhang, Zheng
    Xue, Jingfeng
    Chen, Tian
    Zhao, Yuhang
    Meng, Weizhi
    JOURNAL OF SYSTEMS ARCHITECTURE, 2024, 152
  • [50] Vulnerability detection based on federated learning
    Zhang, Chunyong
    Yu, Tianxiang
    Liu, Bin
    Xin, Yang
    INFORMATION AND SOFTWARE TECHNOLOGY, 2024, 167