4   Artículos

 
en línea
Kailong Zhu, Yuliang Lu, Hui Huang, Lu Yu and Jiazhen Zhao    
Control Flow Graphs (CFGs) provide fundamental data for many program analyses, such as malware analysis, vulnerability detection, code similarity analysis, etc. Existing techniques for constructing control flow graphs include static, dynamic, and hybrid ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo and Tai Yue    
At present, embedded devices have become a part of people?s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stat... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »