Open Access
Issue
E3S Web of Conf.
Volume 531, 2024
Ural Environmental Science Forum “Sustainable Development of Industrial Region” (UESF-2024)
Article Number 03005
Number of page(s) 10
Section Mathematical Modelling of Energy Systems
DOI https://doi.org/10.1051/e3sconf/202453103005
Published online 03 June 2024
  1. Gary McGraw/ Software Security: Building Security In (Addison-Wesley Professional, 2006) [Google Scholar]
  2. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Addison-Wesley Professional, 2006) [Google Scholar]
  3. C. Beaman, M. Redbourne, J.D. Mummery, S. Hakak, Fuzzing vulnerability discovery techniques: Survey, challenges and future directions, Computers & Security, 120 (2022). DOI: 10.1016/j.cose.2022.102813. [CrossRef] [Google Scholar]
  4. A. Kurmus, R. Tartler, D. Dorneanu, B. Heinloth, V. Rothberg, A. Ruprecht, W. Schroder-Preikschat, D. Lohmann, and R. Kapitza, Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring, NDSS Symposium (2013). URL: https://www.ndss-symposium.org/wp-content/uploads/2017/09/03_2_0.pdf. [Google Scholar]
  5. L. Peng, Attack surface analysis and code coverage improvement for fuzzing. Master’s thesis, Nanyang Technological University, Singapore (2019). DOI: 10.32657/10356/105642. [Google Scholar]
  6. S. Bavendiek. Attack surface analysis of the Linux kernel based on complexity metric, Master’s Thesis in the study course “Applied Informatics / Software Engineering” (2021), DOI: 10.13140/RG.2.2.29943.70561. [Google Scholar]
  7. P.M. Dovgalyuk, M.A. Klimushenkova, N.I. Fursova, V.M. Stepanov., I.A. Vasiliev, A.A. Ivanov, A.V. Ivanov, M.G. Bakulin, D.I. Egorov, Natch: using virtual machine introspection and taint analysis for detection attack surface of the software, Proc. ISP RAS, 34, pp. 89-110 (2022). DOI: 10.15514/ISPRAS-2022-34(5)-6. [CrossRef] [Google Scholar]
  8. E.J. Schwartz E.J., Avgerinos T., Brumley D, All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask), Proc. of the IEEE Symposium on Security and Privacy, pp. 317-331 (2010). DOI: 10.1109/SP.2010.26. [Google Scholar]
  9. Z. Jia, C. Yang, X. Zhao, X. Li, J. Ma, Design and implementation of an efficient container tag dynamic taint analysis, Computers & Security, 135 (2023). DOI: 10.1016/j.cose.2023.103528. [Google Scholar]
  10. A. Davanian A., Z. Qi, Y. Qu., H. Yin, DECAF++: Elastic Whole-System Dynamic Taint Analysis. Proc. of the 22nd Intern. Symp. on RAID, pp. 31-45 (2019). URL: https://www.usenix.org/conference/raid2019/presentation/davanian. [Google Scholar]
  11. C. Chen, B. Cui, J. Ma, R. Wu, J. Guo, W. Liu, A systematic review of fuzzing techniques, Computers & Security, 75, pp. 118-137 (2018). DOI: 10.1016/j.cose.2018.02.002. [CrossRef] [Google Scholar]
  12. C. Beaman, M. Redbourne, J. D. Mummery, S. Hakak, Fuzzing vulnerability discovery techniques: Survey, challenges and future directions, Computers & Security, 120, art.102813 (2022). DOI: 10.1016/j.cose.2022.102813 [CrossRef] [Google Scholar]
  13. N. Nissim, R. Yahalom, Y. Elovici, USB-based attacks, Computers & Security, 70, pp. 675-688 (2017). DOI: 10.1016/j.cose.2017.08.002. [CrossRef] [Google Scholar]
  14. X. Li, L. Zhao, Q.Wei, Z. Wu, W. Shi, Y. Wang, SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices, Computers & Security, 138, art.103618, (2024). DOI: 10.1016/j.cose.2023.103618 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.