نتایج جستجو برای: Topological fuzz

تعداد نتایج: 70052  

2011
Rebecca Shapiro Sergey Bratus Edmond Rogers Sean W. Smith

Security vulnerabilities typically arise from bugs in input validation and in the application logic. Fuzz-testing is a popular security evaluation technique in which hostile inputs are crafted and passed to the target software in order to reveal bugs. However, in the case of SCADA systems, the use of proprietary protocols makes it difficult to apply existing fuzz-testing techniques as they work...

Journal: :Biomedical instrumentation & technology 2014
Steven D Baker

What is Fuzz Testing? Fuzz testing is a type of negative software testing. In contrast to positive software testing, during which one tests whether the software is behaving as it should, negative testing seeks to check whether the software doesn’t behave the way it’s not supposed to. Fuzz testing typically applies test vectors that are almost correct, such as an invalid packet-length field in a...

2015
Vadim Okun Elizabeth Fong

Multiple techniques and tools, including static analysis and testing, should be used for software assurance. Fuzz testing is one such technique that can be effective for finding security vulnerabilities. In contrast with traditional testing, fuzz testing only monitors the program for crashes or other undesirable behavior. This makes it feasible to run a very large number of test cases. This art...

2011
Rebecca Shapiro Sergey Bratus Edmond Rogers Sean Smith

Security vulnerabilities typically start with bugs: in input validation, and also in deeper application logic. Fuzz-testing is a popular security evaluation technique in which hostile inputs are crafted and passed to the target software in order to reveal such bugs. However, for SCADA software used in critical infrastructure, the widespread use of proprietary protocols makes it difficult to app...

2017
Su Yong Kim Sangho Lee Insu Yun Wen Xu Byoungyoung Lee Youngtae Yun Taesoo Kim

Discovering the security vulnerabilities of commercial off-the-shelf (COTS) operating systems (OSes) is challenging because they not only are huge and complex, but also lack detailed debug information. Concolic testing, which generates all feasible inputs of a program by using symbolic execution and tests the program with the generated inputs, is one of the most promising approaches to solve th...

Journal: :Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 2005

Journal: :IEEE Computational Intelligence Magazine 2021

Journal: :Journal of Japan Society for Fuzzy Theory and Intelligent Informatics 2004

Journal: :IEEE Computational Intelligence Magazine 2022

A category $mathbf{C}$ is called Cartesian closed  provided that it has finite products and for each$mathbf{C}$-object $A$ the functor $(Atimes -): Ara A$ has a right adjoint. It is well known that the category $mathbf{TopFuzz}$  of all topological fuzzes is both complete  and cocomplete, but it is not Cartesian closed. In this paper, we introduce some Cartesian closed subcategories of this cat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید