|
|
|
Xinglu He, Pengfei Wang, Kai Lu and Xu Zhou
A multi-priority scheduling path exploration technology based on abstract syntax tree analysis.
|
|
|
|
|
|
|
Zehan Chen, Yuliang Lu, Kailong Zhu, Lu Yu and Jiazhen Zhao
Fuzzing is one of the most successful software testing techniques used to discover vulnerabilities in programs. Without seeds that fit the input format, existing runtime dependency recognition strategies are limited by incompleteness and high overhead. I...
ver más
|
|
|
|
|
|
|
Milad Memarzadeh, Ata Akbari Asanjan and Bryan Matthews
Identifying safety anomalies and vulnerabilities in the aviation domain is a very expensive and time-consuming task. Currently, it is accomplished via manual forensic reviews by subject matter experts (SMEs). However, with the increase in the amount of d...
ver más
|
|
|
|
|
|
|
Miao Yu, Jianwei Zhuge, Ming Cao, Zhiwei Shi and Lin Jiang
With the prosperity of the Internet of Things (IoT) industry environment, the variety and quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart homes, smart wear, smart manufacturing, smart cars, smart medical care, and m...
ver más
|
|
|
|