期刊文献+
共找到1,030篇文章
< 1 2 52 >
每页显示 20 50 100
Composite anti-disturbance predictive control of unmanned systems with time-delay using multi-dimensional Taylor network 被引量:1
1
作者 Chenlong LI Wenshuo LI Zejun ZHANG 《Chinese Journal of Aeronautics》 2025年第7期589-600,共12页
A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source di... A composite anti-disturbance predictive control strategy employing a Multi-dimensional Taylor Network(MTN)is presented for unmanned systems subject to time-delay and multi-source disturbances.First,the multi-source disturbances are addressed according to their specific characteristics as follows:(A)an MTN data-driven model,which is used for uncertainty description,is designed accompanied with the mechanism model to represent the unmanned systems;(B)an adaptive MTN filter is used to remove the influence of the internal disturbance;(C)an MTN disturbance observer is constructed to estimate and compensate for the influence of the external disturbance;(D)the Extended Kalman Filter(EKF)algorithm is utilized as the learning mechanism for MTNs.Second,to address the time-delay effect,a recursiveτstep-ahead MTN predictive model is designed utilizing recursive technology,aiming to mitigate the impact of time-delay,and the EKF algorithm is employed as its learning mechanism.Then,the MTN predictive control law is designed based on the quadratic performance index.By implementing the proposed composite controller to unmanned systems,simultaneous feedforward compensation and feedback suppression to the multi-source disturbances are conducted.Finally,the convergence of the MTN and the stability of the closed-loop system are established utilizing the Lyapunov theorem.Two exemplary applications of unmanned systems involving unmanned vehicle and rigid spacecraft are presented to validate the effectiveness of the proposed approach. 展开更多
关键词 multi-dimensional Taylor network Composite anti-disturbance Predictive control Unmanned systems Multi-source disturbances TIME-DELAY
原文传递
A New Fuzzing Technique for Software Vulnerability Mining Using Multi-dimension Inputs 被引量:5
2
作者 Xueyong Zhu Zhiyong Wu J. William Atwood 《通讯和计算机(中英文版)》 2011年第2期88-95,共8页
关键词 输入输出 技术 模糊化 挖掘 维度 软件 测试用例 目标函数
在线阅读 下载PDF
ADFEmu:Enhancing Firmware Fuzzing with Direct Memory Access(DMA)Input Emulation Using Concolic Execution and Large Language Models(LLMs)
3
作者 Yixin Ding Xinjian Zhao +3 位作者 Zicheng Wu Yichen Zhu Longkun Bai Hao Han 《Computers, Materials & Continua》 2025年第9期5977-5993,共17页
Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques inef... Fuzz testing is a widely adopted technique for uncovering bugs and security vulnerabilities in embedded firmware.However,many embedded systems heavily rely on peripherals,rendering conventional fuzzing techniques ineffective.When peripheral responses are missing or incorrect,fuzzing a firmware may crash or exit prematurely,significantly limiting code coverage.While prior re-hosting approaches have made progress in simulating Memory-Mapped Input/Output(MMIO)and interrupt-based peripherals,they either ignore Direct Memory Access(DMA)or handle it oversimplified.In this work,we present ADFEmu,a novel automated firmware re-hosting framework that enables effective fuzzing of DMA-enabled firmware.ADFEmu integrates concolic execution with large language models(LLMs)to semantically emulate DMA operations and synthesize peripheral input sequences intelligently.Specifically,it learns DMA transfer patterns from the firmware’s context and employs guided symbolic execution to explore deeper and more diverse execution paths.This approach allows firmware to operate stably without hardware dependencies while achieving higher fidelity in emulation.Evaluated on real-world embedded firmware samples,ADFEmu achieves a 100%re-hosting success rate,improves total execution path exploration by 5.31%,and triggers more crashes compared to the state-of-the-art.These results highlight ADFEmu’s effectiveness in overcoming long-standing limitations of DMA emulation and its potential to advance automated vulnerability discovery in peripheral-rich embedded environments. 展开更多
关键词 fuzz testing firmware rehosting DMA concolic execution LLMs
在线阅读 下载PDF
Sensitive Target-Guided Directed Fuzzing for IoT Web Services
4
作者 Xiongwei Cui Yunchao Wang Qiang Wei 《Computers, Materials & Continua》 2025年第6期4939-4959,共21页
The development of the Internet of Things(IoT)has brought convenience to people’s lives,but it also introduces significant security risks.Due to the limitations of IoT devices themselves and the challenges of re-host... The development of the Internet of Things(IoT)has brought convenience to people’s lives,but it also introduces significant security risks.Due to the limitations of IoT devices themselves and the challenges of re-hosting technology,existing fuzzing for IoT devices is mainly conducted through black-box methods,which lack effective execution feedback and are blind.Meanwhile,the existing static methods mainly rely on taint analysis,which has high overhead and high false alarm rates.We propose a new directed fuzz testing method for detecting bugs in web service programs of IoT devices,which can test IoT devices more quickly and efficiently.Specifically,we identify external input entry points using multiple features.Then we quickly find sensitive targets and paths affected by external input sources based on sensitive data flow analysis of decompiled code,treating them as testing objects.Finally,we performa directed fuzzing test.We use debugging interfaces to collect execution feedback and guide the programto reach sensitive targets based on programpruning techniques.We have implemented a prototype system,AntDFuzz,and evaluated it on firmware fromten devices across five well-known manufacturers.We discovered twelve potential vulnerabilities,seven of which were confirmed and assigned bug id by China National Vulnerability Database(CNVD).The results show that our approach has the ability to find unknown bugs in real devices and is more efficient compared to existing tools. 展开更多
关键词 IOT directed fuzzing sensitive targets VULNERABILITIES
在线阅读 下载PDF
基于Fuzzing的全新网络安全监测系统设计
5
作者 吕甦 邹伟 《信息记录材料》 2025年第9期146-148,151,共4页
针对现有网络安全测试系统效率较低的问题,本文提出了一种基于模糊测试(Fuzzing)的网络安全监测系统设计方法。首先,在分析模糊测试技术的基础上,设计了一个由数据采集、异常检测、报告与反馈等模块组成的新型网络安全监测系统。其次,... 针对现有网络安全测试系统效率较低的问题,本文提出了一种基于模糊测试(Fuzzing)的网络安全监测系统设计方法。首先,在分析模糊测试技术的基础上,设计了一个由数据采集、异常检测、报告与反馈等模块组成的新型网络安全监测系统。其次,利用模糊测试核心算法对数据与漏洞进行分析监测。最后,搭建测试环境对系统性能进行评估。实验结果表明:本文设计的网络安全监测系统能有效提升安全监测效率,并减轻系统负荷。 展开更多
关键词 模糊测试(fuzzing) 网络安全 监测系统
在线阅读 下载PDF
RBZZER:A Directed Fuzzing Technique for Efficient Detection of Memory Leaks via Risk Area Analysis
6
作者 Xi Peng Peng Jia +1 位作者 Ximing Fan Jiayong Liu 《Computers, Materials & Continua》 2025年第9期4601-4625,共25页
Memory leak is a common software vulnerability that can decrease the reliability of an application and,in severe cases,even cause program crashes.If there are intentionally triggerable memory leak vulnerabilities in a... Memory leak is a common software vulnerability that can decrease the reliability of an application and,in severe cases,even cause program crashes.If there are intentionally triggerable memory leak vulnerabilities in a program,attackers can exploit these bugs to launch denial-of-service attacks or induce the program to exhibit unexpected behaviors due to low memory conditions.Existing fuzzing techniques primarily focus on improving code coverage,and specialized fuzzing techniques for individual memory-related defects like uncontrolled memory allocation do not address memory leak vulnerabilities.MemLock is the first fuzzing technique to address memory consumption vulnerabilities including memory leakage.However,the coverage-centric guidance mechanism of MemLock introduces a degree of aimlessness in the testing process,that results in low seed quality and slow bug exposure speed.To address this issue,we propose a risk areas guidance-based fuzzing technique called RBZZER.First,RBZZER retains MemLock’s memory consumption-guided mechanism and introduces a novel distance-guided approach to expedite the arrival of fuzzing at the potential memory areas.Second,we introduce a new seed scheduling strategy called risk areas-based seed scheduling,which classifies seeds based on potential memory leak areas in the program and further schedules them,thereby effectively improving the efficiency of discovering memory leak vulnerabilities.Experiments demonstrate that RBZZER outperforms the state-of-the-art fuzzing techniques by finding 52%more program unique crashes than the second-best counterpart.In particular,RBZZER can discover the amount of memory leakage at least 112%more than the other baseline fuzzers.Besides,RBZZER detects memory leaks at an average speed that is 9.10x faster than MemLock. 展开更多
关键词 System security software testing directed fuzzing memory leak vulnerability
在线阅读 下载PDF
Retraced Multi-dimensional Chinese Logic System behind Chinese Medicine
7
作者 Edwin C.L.Yu 《Chinese Medicine and Culture》 2025年第1期1-12,共12页
The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed... The ancient tacit knowledge behind the logic system permeated the culture and promoted numerous impactful inventions throughout the history. Traditional Chinese medicine with its effectiveness should also have stemmed out from such logic system. This article aims to rearticulate the underlying lucid multi-dimensional logic system, which faded in obscurity only because of time-out loss of the mid-right concept. Retracing this past tacit but important concept could uncover a multi-dimensional system over a point relating to all matters while capturing the central core of the matter. The seemingly unmanageable multidimensional logic was strengthened by verification processes which affirmed its further extensions, and made up the language of the people, the concepts of yin-yang(阴阳), and the development of extensions of Ba Gua(八卦) derivatives, which furthered the interpretation of the space-time properties and Chinese medicine. 展开更多
关键词 multi-dimensional logic system Traditional Chinese medicine YIN-YANG
暂未订购
Effective stress dissipation by multi-dimensional architecture engineering for ultrafast and ultralong sodium storage
8
作者 Man Zhang Jing Zhu +7 位作者 Qianqian Li Fenghua Zheng Sijiang Hu Youguo Huang Hongqiang Wang Xing Ou Qichang Pan Qingyu Li 《Journal of Energy Chemistry》 2025年第2期619-629,I0013,共12页
Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial... Stress accumulation is a key factor leading to sodium storage performance deterioration for NiSe_(2)-based anodes.Therefore,inhibiting the concentrated local stress during the sodiataion/desodiation process is crucial for acquiring stable NiSe2-based materials for sodium-ion batteries(SIBs),Herein,a stress dissipation strategy driven by architecture engineering is proposed,which can achieve ultrafast and ultralong sodium storage properties.Different from the conventional sphere-like or rod-like architecture,the three-dimensional(3D)flower-like NiSe_(2)@C composite is delicately designed and assembled with onedimensional nanorods and carbon framework.More importantly,the fundamental mechanism of improved structure stability is unveiled by simulations and experimental results simultaneously.It demonstrates that this designed multidimensional flower-like architecture with dispersed nanorods can balance the structural mismatch,avoid concentrated local strain,and relax the internal stress,mainly induced by the unavoidable volume variation during the repeated conversion processes.Moreover,it can provide more Na^(+)-storage sites and multi-directional migration pathways,leading to a fast Na^(+)-migration channel with boosted reaction kinetic.As expected,it delivers superior rate performance(441 mA h g^(-1)at 5.0 A g^(-1))and long cycling stability(563 mA h g^(-1)at 1.0 A g^(-1)over 1000 cycles)for SIBs.This work provides useful insights for designing high-performance conversion-based anode materials for SIBs. 展开更多
关键词 Stress dissipation multi-dimensional architecture Structure engineering Conversion-based anodes Sodium-ion batteries
在线阅读 下载PDF
Research on Multi-Dimensional Collaborative Strategies in Design Management,Investment Management,and Beyond from the Perspective of Whole-Process Engineering Consulting
9
作者 Zexin Chen 《Journal of Architectural Research and Development》 2025年第5期21-28,共8页
This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses ... This paper explores whole-process engineering consulting,including its application models in public buildings and elderly-friendly projects,such as service integration and whole lifecycle management.It also addresses the construction of multi-dimensional collaborative theoretical models,public space streamline organization,and other aspects,emphasizing the importance of multi-dimensional collaboration.Additionally,it highlights the role of talent cultivation and digital transformation in enhancing project efficiency. 展开更多
关键词 Whole-process engineering consulting multi-dimensional collaboration Project efficiency
在线阅读 下载PDF
Practical Application of the Multi-Dimensional Interactive Teaching Model in College English
10
作者 Bo Sun 《Journal of Contemporary Educational Research》 2025年第10期106-111,共6页
The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themse... The multi-dimensional interactive teaching model significantly enhances the effectiveness of college English instruction by emphasizing dynamic engagement between teachers and students,as well as among students themselves.This paper explores practical strategies for implementing this model,focusing on four key aspects:deepening teachers’understanding of the model through continuous learning,innovating interactive methods such as questioning techniques and practical activities,leveraging modern technology to integrate resources and track learning progress,and establishing a communication platform that centers on student participation.By adopting these approaches,the model fosters a student-centered classroom environment,improves comprehensive English application skills,and optimizes overall teaching quality. 展开更多
关键词 multi-dimensional interactive teaching model Student-centered approach Teacher-student interaction
在线阅读 下载PDF
Construction of the Practice System of Landscape Architecture Major Based on“Multi-dimensional Integration”
11
作者 LI Yinan DING Juan +4 位作者 ZHU Yan WU Jing ZHAO Zhiyan LI Jie XIANG Cheng 《Journal of Landscape Research》 2025年第3期89-92,共4页
During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for culti... During the critical transformation period of landscape architecture major after the adjustment of disciplinary structure and the changes in market demand,private colleges and universities,as important places for cultivating local talents,have pain points such as uneven quality of teachers and students and weak innovation and practice.The practice system with“multi-dimensional Integration”integrates four dimensions:interdisciplinary integration,spatial and temporal intersection,historical inheritance,and behavioral activity,deepens the disciplinary connotation,and integrates the three elements of nature,humanity,and technology,aiming to provide a new path for private colleges and universities to cultivate application-oriented and compound talents with innovative capabilities.In terms of optimizing talent cultivation and adapting to industry changes,this system provides thinking and reference for landscape architecture major,helping the major reshape its core competitiveness and promoting educational innovation and industry development. 展开更多
关键词 Landscape architecture Practice system multi-dimensional integration”model Talent cultivation Teaching reform
在线阅读 下载PDF
Reliability of multi-dimensional network systems with nodes having stochastic connection ranges
12
作者 FU Yuqiang MA Xiaoyang ZHAO Fei 《Journal of Systems Engineering and Electronics》 2025年第4期1017-1023,共7页
This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with... This paper proposes a reliability evaluation model for a multi-dimensional network system,which has potential to be applied to the internet of things or other practical networks.A multi-dimensional network system with one source element and multiple sink elements is considered first.Each element can con-nect with other elements within a stochastic connection ranges.The system is regarded as successful as long as the source ele-ment remains connected with all sink elements.An importance measure is proposed to evaluate the performance of non-source elements.Furthermore,to calculate the system reliability and the element importance measure,a multi-valued decision diagram based approach is structured and its complexity is analyzed.Finally,a numerical example about the signal transfer station system is illustrated to analyze the system reliability and the ele-ment importance measure. 展开更多
关键词 multi-dimensional network multi-valued decision diagram stochastic connection range reliability analysis impor-tance measure.
在线阅读 下载PDF
Multi-dimensional hydrogen bonds regulated emissions of single-molecule system enabling surficial hydrophobicity/hydrophilicity mapping
13
作者 Hao Gu Rui Li +6 位作者 Qiuying Li Sheng Lu Yahui Chen Xiaoning Yang Huili Ma Zhijun Xu Xiaoqiang Chen 《Chinese Chemical Letters》 2025年第5期515-520,共6页
Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)feat... Constructing multi-dimensional hydrogen bond(H-bond)regulated single-molecule systems with multiemission remains a challenge.Herein,we report the design of a new excited-state intramolecular proton transfer(ESIPT)featured chromophore(HBT-DPI)that shows flexible emission tunability via the multidimensional regulation of intra-and intermolecular H-bonds.The feature of switchable intramolecular Hbonds is induced via incorporating several hydrogen bond acceptors and donors into one single HBT-DPI molecule,allowing the“turn on/off”of ESIPT process by forming isomers with distinct intramolecular Hbonds configurations.In response to different external H-bonding environments,the obtained four types of crystal/cocrystals vary in the contents of isomers and the molecular packing modes,which are mainly guided by the intermolecular H-bonds,exhibiting non-emissive features or emissions ranging from green to orange.Utilizing the feature of intermolecular H-bond guided molecular packing,we demonstrate the utility of this fluorescent material for visualizing hydrophobic/hydrophilic areas on large-scale heterogeneous surfaces of modified poly(1,1-difluoroethylene)(PVDF)membranes and quantitatively estimating the surface hydrophobicity,providing a new approach for hydrophobicity/hydrophilicity monitoring and measurement.Overall,this study represents a new design strategy for constructing multi-dimensional hydrogen bond regulated ESIPT-based fluorescent materials that enable multiple emissions and unique applications. 展开更多
关键词 multi-dimensional hydrogen bonds Emission regulation Hydrophobicity/hydrophilicity Surficial mapping Excited-state intramolecular proton transfer
原文传递
Comprehensive Black-Box Fuzzing of Electric Vehicle Charging Firmware via a Vehicle to Grid Network Protocol Based on State Machine Path
14
作者 Yu-Bin Kim Dong-Hyuk Shin Ieck-Chae Euom 《Computers, Materials & Continua》 2025年第8期2217-2243,共27页
The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this crit... The global surge in electric vehicle(EV)adoption is proportionally expanding the EV charging station(EVCS)infrastructure,thereby increasing the attack surface and potential impact of security breaches within this critical ecosystem.While ISO 15118 standardizes EV-EVCS communication,its underspecified security guidelines and the variability in manufacturers’implementations frequently result in vulnerabilities that can disrupt charging services,compromise user data,or affect power grid stability.This research introduces a systematic black-box fuzzing methodology,accompanied by an open-source tool,to proactively identify and mitigate such security flaws in EVCS firmware operating under ISO 15118.The proposed approach systematically evaluates EVCS behavior by leveraging the state machine defined in the ISO 15118 standard for test case generation and execution,enabling platform-agnostic testing at the application layer.Message sequences,corresponding to valid andmutated traversals of the protocol’s state machine,are generated to uncover logical errors and improper input handling.Themethodology comprises state-aware initial sequence generation,simulated V2G session establishment,targeted message mutation correlated with defined protocol states,and rigorous response analysis to detect anomalies and system crashes.Experimental validation on an open-source EVCS implementation identified five vulnerabilities.These included session integrity weaknesses allowing unauthorized interruptions,billing manipulation through invalid metering data acceptance,and resource exhaustion vulnerabilities from specific parameter malformations leading to denial-of-service.The findings confirm the proposed method’s capability in pinpointing vulnerabilities often overlooked by standard conformance tests,thus offering a robust and practical solution for enhancing the security and resilience of the rapidly growing EV charging infrastructure. 展开更多
关键词 Internet of Things(IoT)security risk assessment data privacy fuzzing test electric vehicle charger security
在线阅读 下载PDF
A novel multi-dimensional isolation platform for low-frequency excitations:analysis and experiment
15
作者 Lingjun MENG Xiuting SUN Jian XU 《Applied Mathematics and Mechanics(English Edition)》 2025年第12期2241-2264,共24页
To break the limitations of the multi-dimensional(M-D)vibration isolation(VI)platforms with the Stewart-Gough design,such as strongly coupling motions,excessive friction in connections,heavy weight,and limited workspa... To break the limitations of the multi-dimensional(M-D)vibration isolation(VI)platforms with the Stewart-Gough design,such as strongly coupling motions,excessive friction in connections,heavy weight,and limited workspace,this study processes a novel platform integrated by a stiffness-adjustable origami spring sub-structure and a parallel mechanism.The origami-based stiffness-adjustable spring realizes low-frequency VI,and the parallel mechanism symmetry design realizes motions decoupling.In the origami-based sub-leg,the parallel-stack-assembly(PSA)design mechanism with two Miura origami configurations is proposed to generate a symmetrical negative stiffness property.Paired with a linear positive stiffness spring,the origami-based sub-leg has wide-amplitude-high-static-low-dynamic stiffness(WA-HSLDS)characteristics in one direction.Then,with construction of the parallel mechanism connected with origami-based sub-legs,an M-D VI platform is achieved,whose motions in the vertical direction and yaw direction are decoupled with the motions in the other directions.Based on the dynamic model and incremental harmonic balance(IHB)with the arc-length continuation method,appropriate structural parameters in the parallel mechanism part are figured out,and the accurate transmissibility in different directions is defined,which gives the parametric influencing investigations for realization of low-frequency VI performances.Finally,experiments are conducted to validate the accuracy and feasibility of the theoretical methods,and to demonstrate the performance of M-D low-frequency isolation with load-carrying capacity of the proposed VI platform.The integration of the origami into the parallel mechanism results in a compact,efficient,and flexible platform with nonlinear adjustability,offering new possibilities for lightweight M-D VI,and developing the practical applications in high-precision platforms in ocean and aerospace environments. 展开更多
关键词 multi-dimensional(M-D)vibration isolation(VI) wide-amplitude high-static-low-dynamic stiffness(WA-HSLDS) origami-based elastic spring parallel mechanism
在线阅读 下载PDF
Fuzzing技术综述 被引量:30
16
作者 吴志勇 王红川 +2 位作者 孙乐昌 潘祖烈 刘京菊 《计算机应用研究》 CSCD 北大核心 2010年第3期829-832,共4页
通过分析比较多种Fuzzing技术的定义,结合其当前发展所基于的知识和采用的方法,给出了Fuzzing技术的一个新的定义;重点从与黑盒测试技术的区别、测试对象、架构和测试数据产生机理四个方面总结了当前Fuzzing技术采用的一些新思想、新方... 通过分析比较多种Fuzzing技术的定义,结合其当前发展所基于的知识和采用的方法,给出了Fuzzing技术的一个新的定义;重点从与黑盒测试技术的区别、测试对象、架构和测试数据产生机理四个方面总结了当前Fuzzing技术采用的一些新思想、新方法以及它们的缺陷。针对这些缺陷和实际应用中的需求,分别提出了当前Fuzzing技术下一步的具体研究方向和对应的研究方法。 展开更多
关键词 fuzzing技术 黑盒测试 架构 测试数据 生成 变异 动态测试 知识
在线阅读 下载PDF
基于Fuzzing的ActiveX控件漏洞发掘技术 被引量:13
17
作者 吴毓书 周安民 +2 位作者 吴少华 何永强 徐威 《计算机应用》 CSCD 北大核心 2008年第9期2252-2254,共3页
Fuzzing是一种有效的自动化的漏洞发掘技术,基于Fuzzing漏洞发掘思想,结合对ActiveX控件的研究,设计并实现了一个Windows系统下的ActiveX控件漏洞发掘平台,并改进了Fuzzing数据产生方案。通过对某些第三方软件安装的控件进行测试,发现... Fuzzing是一种有效的自动化的漏洞发掘技术,基于Fuzzing漏洞发掘思想,结合对ActiveX控件的研究,设计并实现了一个Windows系统下的ActiveX控件漏洞发掘平台,并改进了Fuzzing数据产生方案。通过对某些第三方软件安装的控件进行测试,发现了两个已知和一个未知的漏洞,提高了漏洞发掘效率。 展开更多
关键词 ActicVX控件 漏洞 漏洞挖掘 fuzzing技术
在线阅读 下载PDF
一种基于遗传算法的Fuzzing测试用例生成新方法 被引量:23
18
作者 刘渊 杨永辉 +1 位作者 张春瑞 王伟 《电子学报》 EI CAS CSCD 北大核心 2017年第3期552-556,共5页
本文根据传统漏洞挖掘Fuzzing技术的特点,针对其存在的不能求解非线性解和只能有单个的输入的问题,提出了一种基于遗传算法的漏洞挖掘测试用例生成的新方法.该方法能够利用遗传算法的优势,同时可以应对多输入测试用例问题和非线性求解问... 本文根据传统漏洞挖掘Fuzzing技术的特点,针对其存在的不能求解非线性解和只能有单个的输入的问题,提出了一种基于遗传算法的漏洞挖掘测试用例生成的新方法.该方法能够利用遗传算法的优势,同时可以应对多输入测试用例问题和非线性求解问题.从自测程序的结果看出,相比于传统随机生成Fuzzing测试用例的方法,本方案在效率和覆盖率方面具有明显的提高. 展开更多
关键词 遗传算法 非线性求解 多维fuzzing技术
在线阅读 下载PDF
基于Fuzzing的文件格式漏洞挖掘技术 被引量:12
19
作者 唐彰国 钟明全 +1 位作者 李焕洲 张健 《计算机工程》 CAS CSCD 北大核心 2010年第16期151-153,160,共4页
软件漏洞挖掘已成为信息安全研究的一个热点,基于此,分析现有漏洞挖掘工具的不足,阐述基于Fuzzing的漏洞挖掘与分析的功能需求,根据文件格式结构化存储的特征,给出一种启发式的畸形数据的构造方法,设计并实现文件型漏洞智能挖掘与分析系... 软件漏洞挖掘已成为信息安全研究的一个热点,基于此,分析现有漏洞挖掘工具的不足,阐述基于Fuzzing的漏洞挖掘与分析的功能需求,根据文件格式结构化存储的特征,给出一种启发式的畸形数据的构造方法,设计并实现文件型漏洞智能挖掘与分析系统,给出软件结构、运行机制和关键技术。实例测试结果表明,该系统有效提高了文件漏洞挖掘的效率和智能化水平。 展开更多
关键词 fuzzing技术 文件格式漏洞 漏洞挖掘
在线阅读 下载PDF
多维Fuzzing技术综述 被引量:12
20
作者 吴志勇 夏建军 +1 位作者 孙乐昌 张旻 《计算机应用研究》 CSCD 北大核心 2010年第8期2810-2813,共4页
Fuzzing技术是一项有效的动态漏洞挖掘技术,但是当前对多维Fuzzing技术的研究还不多见。把多维Fuzzing技术面临的问题归纳为组合爆炸、覆盖脆弱语句和触发潜在漏洞三个问题,对存在的多种多维Fuzzing技术进行了研究和比较,并总结出多维Fu... Fuzzing技术是一项有效的动态漏洞挖掘技术,但是当前对多维Fuzzing技术的研究还不多见。把多维Fuzzing技术面临的问题归纳为组合爆炸、覆盖脆弱语句和触发潜在漏洞三个问题,对存在的多种多维Fuzzing技术进行了研究和比较,并总结出多维Fuzzing技术的三个基本步骤:定位脆弱语句、查找影响脆弱语句的输入元素和多维Fuzzing测试挖掘脆弱语句中的漏洞。最后,给出了多维Fuzzing技术的进一步发展方向。 展开更多
关键词 多维fuzzing技术 组合爆炸 演化测试 遗传算法
在线阅读 下载PDF
上一页 1 2 52 下一页 到第
使用帮助 返回顶部