![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Fuzzing for Stateful Protocol Implementations: Are We There Yet?
Stateful protocols, such as FTP, SIP, and RTSP, play a significant role in computer systems. However, their implementation is prone to security vulnerabilities, which have drawn attention from both industry an...
-
Article
Open AccessPosFuzz: augmenting greybox fuzzing with effective position distribution
Mutation-based greybox fuzzing has been one of the most prevalent techniques for security vulnerability discovery and a great deal of research work has been proposed to improve both its efficiency and effectiv...
-
Article
Open AccessNDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices
Network function virtualization provides programmable in-network middlewares by leveraging virtualization technologies and commodity hardware and has gained popularity among all mainstream network device manuf...
-
Article
Open AccessCAMFuzz: Explainable Fuzzing with Local Interpretation
Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explor...
-
Article
Open AccessESRFuzzer: an enhanced fuzzing framework for physical SOHO router devices to discover multi-Type vulnerabilities
SOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these ...
-
Chapter and Conference Paper
CLTR: Collectively Linking Temporal Records Across Heterogeneous Sources
A huge volume of data on the Web are continually made available, which provides users rich amount of information to learn more about entities. In addition to attribute values of entities, there is often additi...