You et al., 2022 - Google Patents
FuzzDocs: an automated security evaluation framework for IoTYou et al., 2022
View PDF- Document ID
- 7086095853251935321
- Author
- You M
- Kim Y
- Kim J
- Seo M
- Son S
- Shin S
- Lee S
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
As Internet of Things (IoT) devices have rooted themselves in the daily life of billions of people, security threats targeting IoT devices are emerging rapidly. Thus, IoT vendors have employed security testing frameworks to examine IoT devices before releasing them …
- 238000011156 evaluation 0 title description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2705—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/4421—Execution paradigms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformations of program code
- G06F8/41—Compilation
- G06F8/43—Checking; Contextual analysis
- G06F8/436—Semantic checking
- G06F8/437—Type checking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11961021B2 (en) | Complex application attack quantification, testing, detection and prevention | |
Razzaq et al. | Ontology for attack detection: An intelligent approach to web application security | |
US10313382B2 (en) | System and method for visualizing and analyzing cyber-attacks using a graph model | |
CN112131882A (en) | Multi-source heterogeneous network security knowledge graph construction method and device | |
US8607351B1 (en) | Modeling cyberspace attacks | |
You et al. | FuzzDocs: an automated security evaluation framework for IoT | |
CN113811854B (en) | Micro-application function suggestions with cross-application activity relevance | |
CN103238308A (en) | Identity propagation through application layers by using contextual mapping and planted values | |
US12001549B1 (en) | Cybersecurity incident response techniques utilizing artificial intelligence | |
KR102692350B1 (en) | Malicious event log automatic analysis device and method | |
Wang et al. | Demadroid: Object Reference Graph‐Based Malware Detection in Android | |
RU2659482C1 (en) | Protection of web applications with intelligent network screen with automatic application modeling | |
Cheng et al. | CTINEXUS: leveraging optimized LLM in-context learning for constructing cybersecurity knowledge graphs under data scarcity | |
Han et al. | A credential usage study: flow-aware leakage detection in open-source projects | |
Cheng et al. | Ctinexus: Automatic cyber threat intelligence knowledge graph construction using large language models | |
Pasca et al. | LLM-Driven, Self-Improving Framework for Security Test Automation: Leveraging Karate DSL for Augmented API Resilience | |
Wang et al. | RESTlogic: Detecting Logic Vulnerabilities in Cloud REST APIs. | |
Zhu | Attack Pattern Ontology: A Common Language for Cyber-Security Information Sharing | |
CN115643082A (en) | Method and device for determining lost host and computer equipment | |
Gong et al. | Network Protocol Security Evaluation via LLM-Enhanced Fuzzing in Extended ProFuzzBench | |
US11533282B1 (en) | Specifying and testing open communication protocols | |
CN119743328B (en) | Vulnerability scanning method and device, storage medium and computer equipment | |
Xu | [Retracted] Dynamic Analysis of Network Protocol Hiding Behavior Based on Perceptual Mining | |
Wang et al. | Research on automated anomaly localization in the power Internet of Things based on fuzzing and semantic analysis | |
Liu et al. | MQueez: Specification-Driven Fuzzing for MQTT Broker (Registered Report) |