咨询与建议

限定检索结果

文献类型

  • 15 篇 期刊文献

馆藏范围

  • 15 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 13 篇 计算机科学与技术...
    • 9 篇 软件工程
    • 5 篇 网络空间安全
    • 4 篇 控制科学与工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
  • 4 篇 管理学
    • 4 篇 管理科学与工程(可...
  • 1 篇 理学
    • 1 篇 地球物理学

主题

  • 15 篇 vulnerability de...
  • 4 篇 smart contract
  • 3 篇 deep learning
  • 3 篇 static analysis
  • 3 篇 blockchain
  • 1 篇 database securit...
  • 1 篇 ethereum
  • 1 篇 encoders
  • 1 篇 binder
  • 1 篇 data security
  • 1 篇 smart contracts
  • 1 篇 cst-pdg code rep...
  • 1 篇 code similarity
  • 1 篇 software fault l...
  • 1 篇 target isa encod...
  • 1 篇 program slicing
  • 1 篇 computer vision ...
  • 1 篇 memory life-cycl...
  • 1 篇 current advanced...
  • 1 篇 software copyrig...

机构

  • 1 篇 national institu...
  • 1 篇 college of compu...
  • 1 篇 school of cybers...
  • 1 篇 school of cybers...
  • 1 篇 services computi...
  • 1 篇 jiangsu universi...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 the state key la...
  • 1 篇 beijing electron...
  • 1 篇 southeast univer...
  • 1 篇 state key labora...
  • 1 篇 national compute...
  • 1 篇 school of inform...
  • 1 篇 key laboratory o...
  • 1 篇 school of comput...
  • 1 篇 college of infor...
  • 1 篇 texas tech unive...
  • 1 篇 national compute...
  • 1 篇 state key labora...

作者

  • 1 篇 haiyang liu
  • 1 篇 duan pengfei
  • 1 篇 zhiqiang wang
  • 1 篇 qing wang
  • 1 篇 jiawei qin
  • 1 篇 fuyuan wei
  • 1 篇 jiang xunzhi
  • 1 篇 kewei li
  • 1 篇 tuo wang
  • 1 篇 feng yiting
  • 1 篇 gen zhang
  • 1 篇 zhihui song
  • 1 篇 zheng shan
  • 1 篇 yuqing zhang
  • 1 篇 huijuan zhu
  • 1 篇 tai yue
  • 1 篇 hanbing yan
  • 1 篇 peng liu
  • 1 篇 chen kai1 2 3 fe...
  • 1 篇 liangmin wang

语言

  • 15 篇 英文
检索条件"主题词=Vulnerability detection"
15 条 记 录,以下是1-10 订阅
排序:
A Review of Deep Learning-Based vulnerability detection Tools for Ethernet Smart Contracts
收藏 引用
Computer Modeling in Engineering & Sciences 2024年 第7期140卷 77-108页
作者: Huaiguang Wu Yibo Peng Yaqiong He Jinlin Fan School of Computer Science and Technology Zhengzhou University of Light IndustryZhengzhou450001China
In recent years,the number of smart contracts deployed on blockchain has ***,the issue of vulnerability has caused incalculable *** to the irreversible and immutability of smart contracts,vulnerability detection has b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
HCRVD: A vulnerability detection System Based on CST-PDG Hierarchical Code Representation Learning
收藏 引用
Computers, Materials & Continua 2024年 第6期79卷 4573-4601页
作者: Zhihui Song Jinchen Xu Kewei Li Zheng Shan School of Cyberspace Security Information Engineering UniversityZhengzhou450001China
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code ***,due to lim... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
An interpretable model for large-scale smart contract vulnerability detection
收藏 引用
Blockchain(Research and Applications) 2024年 第3期5卷 130-139页
作者: Xia Feng Haiyang Liu Liangmin Wang Huijuan Zhu Victor S.Sheng City University of Macao Macao 999078China Jiangsu University Zhenjiang 212013China Southeast University Nanjing 211189China Texas Tech University Lubbock 79409USA
Smart contracts hold billions of dollars in digital currency,and their security vulnerabilities have drawn a lot of attention in recent *** methods for detecting smart contract vulnerabilities rely primarily on symbol... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Automated vulnerability detection of Blockchain Smart Contacts Based on BERT Artificial Intelligent Model
收藏 引用
China Communications 2024年 第7期21卷 237-251页
作者: Feng Yiting Ma Zhaofeng Duan Pengfei Luo Shoushan School of Cyberspace Security Beijing University of Posts and TelecommunicationsBeijing 100876China
The widespread adoption of blockchain technology has led to the exploration of its numerous applications in various *** algorithms and smart contracts are critical components of blockchain *** the benefits of virtual ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Eth2Vec:Learning contract-wide code representations for vulnerability detection on Ethereum smart contracts
收藏 引用
Blockchain(Research and Applications) 2022年 第4期3卷 109-122页
作者: Nami Ashizawa Naoto Yanai Jason Paul Cruz Shingo Okamura School of Information Science and Technology Osaka UniversityOsaka 565-0871Japan Osaka University Osaka 565-0871Japan National Institute of Technology Nara CollegeNara 639-1080Japan
Ethereum smart contracts are computer programs that are deployed and executed on the Ethereum blockchain to enforce agreements among untrusting *** the most prominent platform that supports smart contracts,Ethereum ha... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Double-Layer Positional Encoding Embedding Method for Cross-Platform Binary Function Similarity detection
收藏 引用
Chinese Journal of Electronics 2022年 第4期31卷 604-611页
作者: JIANG Xunzhi WANG Shen YU Xiangzhan GONG Yuxin School of Cyberspace Science Harbin Institute of Technology
The similarity detection between two cross-platform binary functions has been applied in many fields, such as vulnerability detection, software copyright protection or malware classification. Current advanced methods ... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Saudi cloud infrastructure: a security analysis
收藏 引用
Science China(Information Sciences) 2017年 第12期60卷 152-164页
作者: Wahid RAJEH Hai JIN Deqing ZOU Services Computing Technology and System Lab Big Data Technology and System LabCluster and Grid Computing Lab School of Computer Science and TechnologyHuazhong University of Science and Technology School of Computers and Information Technology University of Tabuk
The growing demand and dependence upon cloud services have garnered an increasing level of threat to user data and security. Some of such critical web and cloud platforms have become constant targets for persistent ma... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels
收藏 引用
Journal of Computer Science & Technology 2021年 第6期36卷 1248-1268页
作者: Gen Zhang Peng-Fei Wang Tai Yue Xu Zhou Kai Lu College of Computer National University of Defense TechnologyChangsha 410073China
Allocation,dereferencing,and freeing of memory data in kernels are coherently *** widely exist real cases where the correctness of memory is *** incorrectness in kernel memory brings about significant security issues,... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Vulnerable Region-Aware Greybox Fuzzing
收藏 引用
Journal of Computer Science & Technology 2021年 第5期36卷 1212-1228页
作者: Ling-Yun Situ Zhi-Qiang Zuo Le Guan Lin-Zhang Wang Xuan-Dong Li Jin Shi Peng Liu State Key Laboratory for Novel Software Technology Nanjing UniversityNanjing 210023China School of Information Management Nanjing UniversityNanjing 210023China Department of Computer Science University of GeorgiaAthensGA 30602U.S.A. College of Information Sciences and Technology Pennsylvania State UniversityState CollegePA 16802U.S.A
Fuzzing is known to be one of the most effective techniques to uncover security vulnerabilities of large-scale software *** fuzzing,it is crucial to distribute the fuzzing resource appropriately so as to achieve the b... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A static technique for detecting input validation vulnerabilities in Android apps
收藏 引用
Science China(Information Sciences) 2017年 第5期60卷 210-225页
作者: Zhejun FANG Qixu LIU Yuqing ZHANG Kai WANG Zhiqiang WANG Qianru WU National Computer Network Intrusion Protection Center University of Chinese Academy of Sciences National Computer Network Emergency Response Technical Team/Coordination Center of China State Key Laboratory of Information Security Institute of Information EngineeringChinese Academy of Sciences Beijing Electronic Science and Technology Institute
Input validation vulnerabilities are common in Android apps, especially in inter-component communications. Malicious attacks can exploit this kind of vulnerability to bypass Android security mechanism and compromise t... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论