Protocol reverse engineering through dynamic and static binary analysis

W Ying, LZ Gu, ZX Li, YX Yang - The Journal of China Universities of Posts …, 2013 - Elsevier
This paper presents a new method for protocol reverse engineering, which combines both
the dynamic and static binary analysis. Our work not only does precise positioning on the …

基于应用视角的缓冲区溢出检测技术与工具

司徒凌云, 王林章, 李宣东, 刘杨 - 软件学报, 2019 - jos.org.cn
缓冲区溢出漏洞是危害最为广泛和严重的安全漏洞之一, 彻底消除缓冲区溢出漏洞相当困难.
学术界, 工业界提出了众多缓冲区溢出漏洞检测技术与工具. 面对众多的工具 …

Buffer overflow detection techniques and tools based on application perspective

司徒凌云, 王林章, 李宣东, 刘杨 - Journal of Software, 2019 - jos.org.cn
缓冲区溢出漏洞是危害最为广泛和严重的安全漏洞之一, 彻底消除缓冲区溢出漏洞相当困难.
学术界, 工业界提出了众多缓冲区溢出漏洞检测技术与工具. 面对众多的工具 …

Honggfuzz+: Fuzzing by Adaptation of Cryptographic Mutation

S Bamohabbat Chafjiri, P Legg… - Phil and Tsompanas …, 2023 - papers.ssrn.com
Fuzzing is a widely used technique for software testing, which involves automated
operations at different levels (bit, byte, and block) to generate test cases and identify …

[PDF][PDF] Security Testing over Encrypted Channels on the ARM Platform

F Kilic, B Geßele, HI Akram - … of the 12th International Conference on …, 2017 - 72.52.166.99
Security Testing has been applied for many years to detect vulnerabilities in applications.
With the increasing demand for encryption to protect the confidentiality of network data, the …

Verifying Software Vulnerabilities in IoT Cryptographic Protocols

F Aljaafari, LC Cordeiro, MA Mustafa - arXiv preprint arXiv:2001.09837, 2020 - arxiv.org
Internet of Things (IoT) is a system that consists of a large number of smart devices
connected through a network. The number of these devices is increasing rapidly, which …

[PDF][PDF] Black-Box Cooperative Verification Framework for Finding Software Vulnerabilities in Concurrent Programs

FK Aljaafari - 2023 - pure.manchester.ac.uk
Concurrency is becoming increasingly widespread in present-day software systems due to
the performance benefits provided by multi-core hardware [4][5][1]. Examples of using …

[PDF][PDF] EBF: A hybrid verification tool for finding software vulnerabilities in iot cryptographic protocols

F Aljaafari, LC Cordeiro, MA Mustafa… - CoRR, abs …, 2021 - academia.edu
Internet of Things (IoT) consists of a large number of smart devices connected through a
network, which creates a vast amount of data communication, thereby posing new security …

Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations

F Aljaafari, R Menezes, MA Mustafa… - arXiv preprint arXiv …, 2021 - arxiv.org
Internet of Things (IoT) consists of a large number of devices connected through a network,
which exchange a high volume of data, thereby posing new security, privacy, and trust …

[PDF][PDF] Research on Fuzz Testing Framework based on Concolic Execution

X Xie, Y Chen - DEStech Transactions on Computer Science and … - scholar.archive.org
ABSTRACT 1 Vulnerability discovery technology is a significant aspect of the current. The
work of this paper is to design and realize a fuzz framework based on concolic execution …