[go: up one dir, main page]

Touqir et al., 2025 - Google Patents

Systematic exploration of fuzzing in IoT: techniques, vulnerabilities, and open challenges: A. Touqir et al.

Touqir et al., 2025

Document ID
5048533330381571654
Author
Touqir A
Iradat F
Iqbal W
Rakib A
Taskin N
Jadidbonab H
Haas O
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

As our dependence on the internet and digital platforms grows, the risk of cyber threats rises, making it essential to implement effective measures to safeguard sensitive information through cybersecurity, ensure system integrity, and prevent unauthorized data access. Fuzz …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformations of program code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR

Similar Documents

Publication Publication Date Title
WO2019144039A1 (en) Complex application attack quantification, testing, detection and prevention
Yao et al. Identifying privilege separation vulnerabilities in IoT firmware with symbolic execution
US20250039067A1 (en) System and method for enterprise - wide data utilization tracking and risk reporting
Autili et al. Software engineering techniques for statically analyzing mobile apps: research trends, characteristics, and potential for industrial adoption
Arzt et al. The soot-based toolchain for analyzing android apps
Alzaidi et al. DroidRista: a highly precise static data flow analysis framework for android applications
Ognawala et al. Automatically assessing vulnerabilities discovered by compositional analysis
Kamal et al. Risk assessment, threat modeling and security testing in SDLC
Caputo et al. Droids in disarray: detecting frame confusion in hybrid android apps
Wang et al. A systematic literature review on smart contract vulnerability detection by symbolic execution
Genfer et al. Avoiding excessive data exposure through microservice APIs
Li et al. A Survey on Web Application Testing: A Decade of Evolution
Tang et al. Ssldetecter: detecting SSL security vulnerabilities of android applications based on a novel automatic traversal method
Touqir et al. Systematic exploration of fuzzing in IoT: techniques, vulnerabilities, and open challenges: A. Touqir et al.
Chimuco et al. Expediting the design and development of secure cloud-based mobile apps
Martins et al. Systematic literature review on security misconfigurations in web applications
Rouland et al. Detecting information disclosure vulnerability in software architectures using alloy
Zhu et al. HM-SAF: Cross-Layer Static Analysis Framework For HarmonyOS
Liu et al. A comparative study between android phone and TV apps
Sorsa Protocol fuzz testing as a part of secure software development life cycle
Blanco-Aza et al. Comprehensive AI-driven privacy risk assessment in mobile apps and social networks
Choi et al. DryJIN: Detecting Information Leaks in Android Applications
Chang et al. Vulnerable service invocation and countermeasures
Szandała AIOps for Reliability: Evaluating Large Language Models for Automated Root Cause Analysis in Chaos Engineering
Wan et al. Analyzing Excessive Permission Requests in Google Workspace Add-Ons