期刊文献+
共找到1,022篇文章
< 1 2 52 >
每页显示 20 50 100
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
1
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
Sensitive Target-Guided Directed Fuzzing for IoT Web Services
2
作者 Xiongwei Cui Yunchao Wang Qiang Wei 《Computers, Materials & Continua》 2025年第6期4939-4959,共21页
The development of the Internet of Things(IoT)has brought convenience to people’s lives,but it also introduces significant security risks.Due to the limitations of IoT devices themselves and the challenges of re-host... The development of the Internet of Things(IoT)has brought convenience to people’s lives,but it also introduces significant security risks.Due to the limitations of IoT devices themselves and the challenges of re-hosting technology,existing fuzzing for IoT devices is mainly conducted through black-box methods,which lack effective execution feedback and are blind.Meanwhile,the existing static methods mainly rely on taint analysis,which has high overhead and high false alarm rates.We propose a new directed fuzz testing method for detecting bugs in web service programs of IoT devices,which can test IoT devices more quickly and efficiently.Specifically,we identify external input entry points using multiple features.Then we quickly find sensitive targets and paths affected by external input sources based on sensitive data flow analysis of decompiled code,treating them as testing objects.Finally,we performa directed fuzzing test.We use debugging interfaces to collect execution feedback and guide the programto reach sensitive targets based on programpruning techniques.We have implemented a prototype system,AntDFuzz,and evaluated it on firmware fromten devices across five well-known manufacturers.We discovered twelve potential vulnerabilities,seven of which were confirmed and assigned bug id by China National Vulnerability Database(CNVD).The results show that our approach has the ability to find unknown bugs in real devices and is more efficient compared to existing tools. 展开更多
关键词 IOT directed fuzzing sensitive targets VULNERABILITIES
在线阅读 下载PDF
基于Fuzzing的全新网络安全监测系统设计
3
作者 吕甦 邹伟 《信息记录材料》 2025年第9期146-148,151,共4页
针对现有网络安全测试系统效率较低的问题,本文提出了一种基于模糊测试(Fuzzing)的网络安全监测系统设计方法。首先,在分析模糊测试技术的基础上,设计了一个由数据采集、异常检测、报告与反馈等模块组成的新型网络安全监测系统。其次,... 针对现有网络安全测试系统效率较低的问题,本文提出了一种基于模糊测试(Fuzzing)的网络安全监测系统设计方法。首先,在分析模糊测试技术的基础上,设计了一个由数据采集、异常检测、报告与反馈等模块组成的新型网络安全监测系统。其次,利用模糊测试核心算法对数据与漏洞进行分析监测。最后,搭建测试环境对系统性能进行评估。实验结果表明:本文设计的网络安全监测系统能有效提升安全监测效率,并减轻系统负荷。 展开更多
关键词 模糊测试(fuzzing) 网络安全 监测系统
在线阅读 下载PDF
RBZZER:A Directed Fuzzing Technique for Efficient Detection of Memory Leaks via Risk Area Analysis
4
作者 Xi Peng Peng Jia +1 位作者 Ximing Fan Jiayong Liu 《Computers, Materials & Continua》 2025年第9期4601-4625,共25页
Memory leak is a common software vulnerability that can decrease the reliability of an application and,in severe cases,even cause program crashes.If there are intentionally triggerable memory leak vulnerabilities in a... Memory leak is a common software vulnerability that can decrease the reliability of an application and,in severe cases,even cause program crashes.If there are intentionally triggerable memory leak vulnerabilities in a program,attackers can exploit these bugs to launch denial-of-service attacks or induce the program to exhibit unexpected behaviors due to low memory conditions.Existing fuzzing techniques primarily focus on improving code coverage,and specialized fuzzing techniques for individual memory-related defects like uncontrolled memory allocation do not address memory leak vulnerabilities.MemLock is the first fuzzing technique to address memory consumption vulnerabilities including memory leakage.However,the coverage-centric guidance mechanism of MemLock introduces a degree of aimlessness in the testing process,that results in low seed quality and slow bug exposure speed.To address this issue,we propose a risk areas guidance-based fuzzing technique called RBZZER.First,RBZZER retains MemLock’s memory consumption-guided mechanism and introduces a novel distance-guided approach to expedite the arrival of fuzzing at the potential memory areas.Second,we introduce a new seed scheduling strategy called risk areas-based seed scheduling,which classifies seeds based on potential memory leak areas in the program and further schedules them,thereby effectively improving the efficiency of discovering memory leak vulnerabilities.Experiments demonstrate that RBZZER outperforms the state-of-the-art fuzzing techniques by finding 52%more program unique crashes than the second-best counterpart.In particular,RBZZER can discover the amount of memory leakage at least 112%more than the other baseline fuzzers.Besides,RBZZER detects memory leaks at an average speed that is 9.10x faster than MemLock. 展开更多
关键词 System security software testing directed fuzzing memory leak vulnerability
在线阅读 下载PDF
Retraced Multi-dimensional Chinese Logic System behind Chinese Medicine
5
作者 Edwin C.L.Yu 《Chinese Medicine and Culture》 2025年第1期1-12,共12页
The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed... The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed out from such logic system. This article aims to rearticulate the underlying lucid multi-dimensional logic system, which faded in obscurity only because of time-out loss of the mid-right concept. Retracing this past tacit but important concept could uncover a multi-dimensional system over a point relating to all matters while capturing the central core of the matter. The seemingly unmanageable multidimensional logic was strengthened by verification processes which affirmed its further extensions, and made up the language of the people, the concepts of yin-yang(阴阳), and the development of extensions of Ba Gua(八卦) derivatives, which furthered the interpretation of the space-time properties and Chinese medicine. 展开更多
关键词 multi-dimensional logic system Traditional Chinese medicine YIN-YANG
暂未订购
Effective stress dissipation by multi-dimensional architecture engineering for ultrafast and ultralong sodium storage
6
作者 Man Zhang Jing Zhu +7 位作者 Qianqian Li Fenghua Zheng Sijiang Hu Youguo Huang Hongqiang Wang Xing Ou Qichang Pan Qingyu Li 《Journal of Energy Chemistry》 2025年第2期619-629,I0013,共12页
Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial... Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial for acquiring stable NiSe2-based materials for sodium-ion batteries(SIBs),Herein,a stress dissipation strategy driven by architecture engineering is proposed,which can achieve ultrafast and ultralong sodium storage properties.Different from the conventional sphere-like or rod-like architecture,the three-dimensional(3D)flower-like NiSe_(2)@C composite is delicately designed and assembled with onedimensional nanorods and carbon framework.More importantly,the fundamental mechanism of improved structure stability is unveiled by simulations and experimental results simultaneously.It demonstrates that this designed multidimensional flower-like architecture with dispersed nanorods can balance the structural mismatch,avoid concentrated local strain,and relax the internal stress,mainly induced by the unavoidable volume variation during the repeated conversion processes.Moreover,it can provide more Na^(+)-storage sites and multi-directional migration pathways,leading to a fast Na^(+)-migration channel with boosted reaction kinetic.As expected,it delivers superior rate performance(441 mA h g^(-1)at 5.0 A g^(-1))and long cycling stability(563 mA h g^(-1)at 1.0 A g^(-1)over 1000 cycles)for SIBs.This work provides useful insights for designing high-performance conversion-based anode materials for SIBs. 展开更多
关键词 Stress dissipation multi-dimensional architecture Structure engineering Conversion-based anodes Sodium-ion batteries
在线阅读 下载PDF
Research on Multi-Dimensional Collaborative Strategies in Design Management,Investment Management,and Beyond from the Perspective of Whole-Process Engineering Consulting
7
作者 Zexin Chen 《Journal of Architectural Research and Development》 2025年第5期21-28,共8页
This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses ... This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses the construction of multi-dimensional collaborative theoretical models,public space streamline organization,and other aspects,emphasizing the importance of multi-dimensional collaboration.Additionally,it highlights the role of talent cultivation and digital transformation in enhancing project efficiency. 展开更多
关键词 Whole-process engineering consulting multi-dimensional collaboration Project efficiency
在线阅读 下载PDF
Practical Application of the Multi-Dimensional Interactive Teaching Model in College English
8
作者 Bo Sun 《Journal of Contemporary Educational Research》 2025年第10期106-111,共6页
The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themse... The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themselves.This paper explores practical strategies for implementing this model,focusing on four key aspects:deepening teachers’understanding of the model through continuous learning,innovating interactive methods such as questioning techniques and practical activities,leveraging modern technology to integrate resources and track learning progress,and establishing a communication platform that centers on student participation.By adopting these approaches,the model fosters a student-centered classroom environment,improves comprehensive English application skills,and optimizes overall teaching quality. 展开更多
关键词 multi-dimensional interactive teaching model Student-centered approach Teacher-student interaction
在线阅读 下载PDF
Composite anti-disturbance predictive control of unmanned systems with time-delay using multi-dimensional Taylor network
9
作者 Chenlong LI Wenshuo LI Zejun ZHANG 《Chinese Journal of Aeronautics》 2025年第7期589-600,共12页
A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source di... A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source disturbances are addressed according to their specific characteristics as follows:(A)an MTN data-driven model,which is used for uncertainty description,is designed accompanied with the mechanism model to represent the unmanned systems;(B)an adaptive MTN filter is used to remove the influence of the internal disturbance;(C)an MTN disturbance observer is constructed to estimate and compensate for the influence of the external disturbance;(D)the Extended Kalman Filter(EKF)algorithm is utilized as the learning mechanism for MTNs.Second,to address the time-delay effect,a recursiveτstep-ahead MTN predictive model is designed utilizing recursive technology,aiming to mitigate the impact of time-delay,and the EKF algorithm is employed as its learning mechanism.Then,the MTN predictive control law is designed based on the quadratic performance index.By implementing the proposed composite controller to unmanned systems,simultaneous feedforward compensation and feedback suppression to the multi-source disturbances are conducted.Finally,the convergence of the MTN and the stability of the closed-loop system are established utilizing the Lyapunov theorem.Two exemplary applications of unmanned systems involving unmanned vehicle and rigid spacecraft are presented to validate the effectiveness of the proposed approach. 展开更多
关键词 multi-dimensional Taylor network Composite anti-disturbance Predictive control Unmanned systems Multi-source disturbances TIME-DELAY
原文传递
Construction of the Practice System of Landscape Architecture Major Based on“Multi-dimensional Integration”
10
作者 LI Yinan DING Juan +4 位作者 ZHU Yan WU Jing ZHAO Zhiyan LI Jie XIANG Cheng 《Journal of Landscape Research》 2025年第3期89-92,共4页
During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for culti... During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for cultivating local talents,have pain points such as uneven quality of teachers and students and weak innovation and practice.The practice system with“multi-dimensional Integration”integrates four dimensions:interdisciplinary integration,spatial and temporal intersection,historical inheritance,and behavioral activity,deepens the disciplinary connotation,and integrates the three elements of nature,humanity,and technology,aiming to provide a new path for private colleges and universities to cultivate application-oriented and compound talents with innovative capabilities.In terms of optimizing talent cultivation and adapting to industry changes,this system provides thinking and reference for landscape architecture major,helping the major reshape its core competitiveness and promoting educational innovation and industry development. 展开更多
关键词 Landscape architecture Practice system multi-dimensional integration”model Talent cultivation Teaching reform
在线阅读 下载PDF
Reliability of multi-dimensional network systems with nodes having stochastic connection ranges
11
作者 FU Yuqiang MA Xiaoyang ZHAO Fei 《Journal of Systems Engineering and Electronics》 2025年第4期1017-1023,共7页
This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with... This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with one source element and multiple sink elements is considered first.Each element can con-nect with other elements within a stochastic connection ranges.The system is regarded as successful as long as the source ele-ment remains connected with all sink elements.An importance measure is proposed to evaluate the performance of non-source elements.Furthermore,to calculate the system reliability and the element importance measure,a multi-valued decision diagram based approach is structured and its complexity is analyzed.Finally,a numerical example about the signal transfer station system is illustrated to analyze the system reliability and the ele-ment importance measure. 展开更多
关键词 multi-dimensional network multi-valued decision diagram stochastic connection range reliability analysis impor-tance measure.
在线阅读 下载PDF
Multi-dimensional hydrogen bonds regulated emissions of single-molecule system enabling surficial hydrophobicity/hydrophilicity mapping
12
作者 Hao Gu Rui Li +6 位作者 Qiuying Li Sheng Lu Yahui Chen Xiaoning Yang Huili Ma Zhijun Xu Xiaoqiang Chen 《Chinese Chemical Letters》 2025年第5期515-520,共6页
Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)feat... Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)featured chromophore(HBT-DPI)that shows flexible emission tunability via the multidimensional regulation of intra-and intermolecular H-bonds.The feature of switchable intramolecular Hbonds is induced via incorporating several hydrogen bond acceptors and donors into one single HBT-DPI molecule,allowing the“turn on/off”of ESIPT process by forming isomers with distinct intramolecular Hbonds configurations.In response to different external H-bonding environments,the obtained four types of crystal/cocrystals vary in the contents of isomers and the molecular packing modes,which are mainly guided by the intermolecular H-bonds,exhibiting non-emissive features or emissions ranging from green to orange.Utilizing the feature of intermolecular H-bond guided molecular packing,we demonstrate the utility of this fluorescent material for visualizing hydrophobic/hydrophilic areas on large-scale heterogeneous surfaces of modified poly(1,1-difluoroethylene)(PVDF)membranes and quantitatively estimating the surface hydrophobicity,providing a new approach for hydrophobicity/hydrophilicity monitoring and measurement.Overall,this study represents a new design strategy for constructing multi-dimensional hydrogen bond regulated ESIPT-based fluorescent materials that enable multiple emissions and unique applications. 展开更多
关键词 multi-dimensional hydrogen bonds Emission regulation Hydrophobicity/hydrophilicity Surficial mapping Excited-state intramolecular proton transfer
原文传递
Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path
13
作者 Yu-Bin Kim Dong-Hyuk Shin Ieck-Chae Euom 《Computers, Materials & Continua》 2025年第8期2217-2243,共27页
The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this crit... The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem.While ISO 15118 standardizes EV-EVCS communication,its underspecified security guidelines and the variability in manufacturers’implementations frequently result in vulnerabilities that can disrupt charging services,compromise user data,or affect power grid stability.This research introduces a systematic black-box fuzzing methodology,accompanied by an open-source tool,to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118.The proposed approach systematically evaluates EVCS behavior by leveraging the state machine defined in the ISO 15118 standard for test case generation and execution,enabling platform-agnostic testing at the application layer.Message sequences,corresponding to valid andmutated traversals of the protocol’s state machine,are generated to uncover logical errors and improper input handling.Themethodology comprises state-aware initial sequence generation,simulated V2G session establishment,targeted message mutation correlated with defined protocol states,and rigorous response analysis to detect anomalies and system crashes.Experimental validation on an open-source EVCS implementation identified five vulnerabilities.These included session integrity weaknesses allowing unauthorized interruptions,billing manipulation through invalid metering data acceptance,and resource exhaustion vulnerabilities from specific parameter malformations leading to denial-of-service.The findings confirm the proposed method’s capability in pinpointing vulnerabilities often overlooked by standard conformance tests,thus offering a robust and practical solution for enhancing the security and resilience of the rapidly growing EV charging infrastructure. 展开更多
关键词 Internet of Things(IoT)security risk assessment data privacy fuzzing test electric vehicle charger security
在线阅读 下载PDF
基于Fuzzing测试的全新网络安全监测系统设计
14
作者 张乾 《数字通信世界》 2024年第10期111-113,共3页
该文提出了一种基于Fuzzing测试的全新网络安全监测系统设计方案。该系统将Fuzzing测试技术与其他先进算法结合,旨在实时监测网络范围内的用户行为、系统参数等关键信息,及时发现并应对潜在的安全威胁。通过阐述系统的硬件和软件设计,... 该文提出了一种基于Fuzzing测试的全新网络安全监测系统设计方案。该系统将Fuzzing测试技术与其他先进算法结合,旨在实时监测网络范围内的用户行为、系统参数等关键信息,及时发现并应对潜在的安全威胁。通过阐述系统的硬件和软件设计,包括监测器、数据处理器、报警器以及各个软件模块的功能与实现方式,展示了该系统的全面性和高效性,以及网络安全监测的准确性和效率,为网络安全领域提供了一种新的防御策略。 展开更多
关键词 fuzzing测试 网络安全 监测系统 硬件设计 软件设计
在线阅读 下载PDF
Fuzzing:Progress,Challenges,and Perspectives
15
作者 Zhenhua Yu Zhengqi Liu +2 位作者 Xuya Cong Xiaobo Li Li Yin 《Computers, Materials & Continua》 SCIE EI 2024年第1期1-29,共29页
As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target progr... As one of the most effective techniques for finding software vulnerabilities,fuzzing has become a hot topic in software security.It feeds potentially syntactically or semantically malformed test data to a target program to mine vulnerabilities and crash the system.In recent years,considerable efforts have been dedicated by researchers and practitioners towards improving fuzzing,so there aremore and more methods and forms,whichmake it difficult to have a comprehensive understanding of the technique.This paper conducts a thorough survey of fuzzing,focusing on its general process,classification,common application scenarios,and some state-of-the-art techniques that have been introduced to improve its performance.Finally,this paper puts forward key research challenges and proposes possible future research directions that may provide new insights for researchers. 展开更多
关键词 fuzzing VULNERABILITY software testing software security
在线阅读 下载PDF
MaliFuzz:Adversarial Malware Detection Model for Defending Against Fuzzing Attack
16
作者 Xianwei Gao Chun Shan Changzhen Hu 《Journal of Beijing Institute of Technology》 EI CAS 2024年第5期436-449,共14页
With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers c... With the prevalence of machine learning in malware defense,hackers have tried to attack machine learning models to evade detection.It is generally difficult to explore the details of malware detection models,hackers can adopt fuzzing attack to manipulate the features of the malware closer to benign programs on the premise of retaining their functions.In this paper,attack and defense methods on malware detection models based on machine learning algorithms were studied.Firstly,we designed a fuzzing attack method by randomly modifying features to evade detection.The fuzzing attack can effectively descend the accuracy of machine learning model with single feature.Then an adversarial malware detection model MaliFuzz is proposed to defend fuzzing attack.Different from the ordinary single feature detection model,the combined features by static and dynamic analysis to improve the defense ability are used.The experiment results show that the adversarial malware detection model with combined features can deal with the attack.The methods designed in this paper have great significance in improving the security of malware detection models and have good application prospects. 展开更多
关键词 adversarial machine learning fuzzing attack malware detection
在线阅读 下载PDF
基于自适应动态区间策略的工业控制协议模糊测试方法TDRFuzzer
17
作者 宗学军 韩冰 +3 位作者 王国刚 宁博伟 何戡 连莲 《计算机应用》 北大核心 2025年第10期3241-3251,共11页
针对模糊测试在工业控制协议(ICP)应用中存在测试用例接受率(TCAR)低和多样性不足等问题,提出一种基于自适应动态区间策略的ICP模糊测试方法。将循环神经网络(RNN)加入Transformer的自注意力机制,以构建协议特征提取模型;使用RNN通过滑... 针对模糊测试在工业控制协议(ICP)应用中存在测试用例接受率(TCAR)低和多样性不足等问题,提出一种基于自适应动态区间策略的ICP模糊测试方法。将循环神经网络(RNN)加入Transformer的自注意力机制,以构建协议特征提取模型;使用RNN通过滑动窗口提取数据的局部特征,并引入自注意力机制进行全局特征提取,以保证TCAR;在自注意力块间添加残差连接,以传递权重分数并提高计算效率;生成过程定义动态区间策略,调节模型在任意时间步的采样范围,从而增加测试用例的多样性;在测试过程中构建字段自适应重要性函数,以定位变异关键字段。基于上述方法,设计模糊测试框架TDRFuzzer,并采用Modbus TCP、S7 comm和Ethernet/IP等3种工业协议进行实验评估。结果表明,相较于GANFuzzer、WGANFuzzer和PeachFuzzer这3种模型,TDRFuzzer的TCAR指标显著提高,且漏洞检测率(VDR)分别提高了0.073、0.035和0.150个百分点,表明TDRFuzzer具备更强的ICP漏洞挖掘能力。 展开更多
关键词 模糊测试 工业控制协议 漏洞挖掘 TRANSFORMER 循环神经网络
在线阅读 下载PDF
A New Fuzzing Technique for Software Vulnerability Mining Using Multi-dimension Inputs 被引量:5
18
作者 Xueyong Zhu Zhiyong Wu J. William Atwood 《通讯和计算机(中英文版)》 2011年第2期88-95,共8页
关键词 输入输出 技术 模糊化 挖掘 维度 软件 测试用例 目标函数
在线阅读 下载PDF
VxFuzzer:基于全系统模拟的VxWorks灰盒模糊测试器
19
作者 李松涛 耿洋洋 +3 位作者 麻荣宽 贾岩 彭建山 曹琰 《网络与信息安全学报》 2025年第4期117-126,共10页
VxWorks作为一款被广泛应用于工业控制、航空航天等关键基础设施领域的实时操作系统,其安全性直接关系到整个工业系统的稳定运行。然而,由于执行环境受限、系统实现复杂及与现有工具兼容性差等问题,对VxWorks系统进行模糊测试仍面临较... VxWorks作为一款被广泛应用于工业控制、航空航天等关键基础设施领域的实时操作系统,其安全性直接关系到整个工业系统的稳定运行。然而,由于执行环境受限、系统实现复杂及与现有工具兼容性差等问题,对VxWorks系统进行模糊测试仍面临较大挑战。为应对这些挑战,研究人员提出并实现了一种基于QEMU全系统仿真的模糊测试框架VxFuzzer。该框架在QEMU全系统仿真的基础上,集成了基本块插桩、异常状态监控和快照恢复功能,能够全面感知目标程序的运行状态。同时,该框架具备良好的兼容性,能够与AFL、Boofuzz等多种模糊测试工具协同工作,从而在VxWorks系统中实现自动化漏洞挖掘。实验结果表明,即使在目标程序基本块数量超过105的复杂场景下,VxFuzzer仍能稳定地记录程序覆盖率的变化,并有效地检测运行过程中的异常行为,展现出优异的覆盖率监控与异常检测性能。在实际测试中,Vx‐Fuzzer成功发现了4个安全漏洞,其中包括URGENT/11系列中的两个已知漏洞和一个0-Day漏洞,验证了该框架在工业级嵌入式系统安全检测中的可行性与有效性。 展开更多
关键词 VXWORKS 模糊测试 全系统仿真 状态监控 异常监控 漏洞挖掘
在线阅读 下载PDF
Application Research of Multi-Dimensional Customer Behavior Analysis Model in Precision Marketing
20
作者 Shuotong Dong 《Open Journal of Applied Sciences》 2024年第12期3589-3600,共12页
The advent of the digital era has provided unprecedented opportunities for businesses to collect and analyze customer behavior data. Precision marketing, as a key means to improve marketing efficiency, highly depends ... The advent of the digital era has provided unprecedented opportunities for businesses to collect and analyze customer behavior data. Precision marketing, as a key means to improve marketing efficiency, highly depends on a deep understanding of customer behavior. This study proposes a theoretical framework for multi-dimensional customer behavior analysis, aiming to comprehensively capture customer behavioral characteristics in the digital environment. This framework integrates concepts of multi-source data including transaction history, browsing trajectories, social media interactions, and location information, constructing a theoretically more comprehensive customer profile. The research discusses the potential applications of this theoretical framework in precision marketing scenarios such as personalized recommendations, cross-selling, and customer churn prevention. Through analysis, the study points out that multi-dimensional analysis may significantly improve the targeting and theoretical conversion rates of marketing activities. However, the research also explores theoretical challenges that may be faced in the application process, such as data privacy and information overload, and proposes corresponding conceptual coping strategies. This study provides a new theoretical perspective on how businesses can optimize marketing decisions using big data thinking while respecting customer privacy, laying a foundation for future empirical research. 展开更多
关键词 Customer Behavior Analysis Precision Marketing multi-dimensional Model Data Theory Personalized Recommendation
在线阅读 下载PDF
上一页 1 2 52 下一页 到第
使用帮助 返回顶部