Li et al., 2020 - Google Patents
V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programsLi et al., 2020
- Document ID
- 15920877882310056808
- Author
- Li Y
- Ji S
- Lyu C
- Chen Y
- Chen J
- Gu Q
- Wu C
- Beyah R
- Publication year
- Publication venue
- IEEE transactions on cybernetics
External Links
Snippet
Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code coverage. It is …
- 238000000034 method 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
- G06F9/32—Address formation of the next instruction, e.g. incrementing the instruction counter, jump
- G06F9/322—Address formation of the next instruction, e.g. incrementing the instruction counter, jump for non-sequential address
- G06F9/328—Address formation of the next instruction, e.g. incrementing the instruction counter, jump for non-sequential address for runtime instruction patching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
- G06F9/38—Concurrent instruction execution, e.g. pipeline, look ahead
- G06F9/3836—Instruction issuing, e.g. dynamic instruction scheduling, out of order instruction execution
- G06F9/3842—Speculative instruction execution
- G06F9/3844—Speculative instruction execution using dynamic prediction, e.g. branch history table
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0793—Remedial or corrective actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/30—Arrangements for executing machine-instructions, e.g. instruction decode
- G06F9/30003—Arrangements for executing specific machine instructions
- G06F9/3005—Arrangements for executing specific machine instructions to perform operations for flow control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/28—Error detection; Error correction; Monitoring by checking the correct order of processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Li et al. | V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs | |
| Chakraborty et al. | Deep learning based vulnerability detection: Are we there yet? | |
| Zeng et al. | Software vulnerability analysis and discovery using deep learning techniques: A survey | |
| He et al. | Learning to fuzz from symbolic execution with application to smart contracts | |
| Pham et al. | CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries | |
| Li et al. | V-fuzz: Vulnerability-oriented evolutionary fuzzing | |
| Li et al. | Fast t2t: Optimization consistency speeds up diffusion-based training-to-testing solving for combinatorial optimization | |
| Guo et al. | Coverage guided differential adversarial testing of deep learning systems | |
| Gan et al. | Ptolemy: Architecture support for robust deep learning | |
| Huang et al. | Decision mamba: Reinforcement learning via hybrid selective sequence modeling | |
| Zhao et al. | Suzzer: A vulnerability-guided fuzzer based on deep learning | |
| Dahl et al. | Stack-based buffer overflow detection using recurrent neural networks | |
| Zekany et al. | CrystalBall: Statically analyzing runtime behavior via deep sequence learning | |
| Zhao et al. | Input‐Output Example‐Guided Data Deobfuscation on Binary | |
| Lin et al. | Towards interpreting ML-based automated malware detection models: A survey | |
| Sawadogo et al. | DeepMalOb: deep detection of obfuscated android malware | |
| Hu et al. | A systematic view of model leakage risks in deep neural network systems | |
| Qin et al. | Syneva: Evaluating ml programs by mirror program synthesis | |
| Alrabaee et al. | CPA: Accurate cross-platform binary authorship characterization using LDA | |
| Shindo et al. | Deisam: Segment anything with deictic prompting | |
| Yadin et al. | Classification diffusion models: Revitalizing density ratio estimation | |
| Wang et al. | Graph neural networks enhanced smart contract vulnerability detection of educational blockchain | |
| Jiang et al. | Enhancing fine-grained vulnerability detection with reinforcement learning | |
| Parisi et al. | Making the most of scarce input data in deep learning-based source code classification for heterogeneous device mapping | |
| Ali et al. | MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts |