The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vulnerabilities do enormous harm to personal computers. What is worse, with emergence of much more applications of computer networks nowadays, network security caused by vulnerabilities has become an important issue. And attacks turned more proficient, making it much more difficult to protect our computer networks. In view of the security issue of complex network, effective identification of attack...
This paper is dedicated to the study of Symbolic Execution and improves the core algorithm of it using Heuristic learning, search and Function Abstraction to effectively address the path explosion problem, which will trigger the vulnerabilities that the traditional method can not find and improve the efficiency, precision and accuracy of software vulnerability discovery.
Buffer overflow vulnerabilities can cause attacks that result in serious consequences. However the techniques of buffer overflow vulnerability detection are limited to manual analysis, binary-patch comparison, fuzzing and so on. They rely on manual analysis, thus cause high overhead. In this paper, we propose a novel method of detection of buffer overflow vulnerabilities, which is based on fuzzing,...
Recent attacks demonstrated that network intrusions have become a major threat to Internet. Systems are employed to detect internet anomaly play a vital role in Internet security. To solve this problem, a technique called frequent episode rules (FERs) base on data mining has been introduced into anomaly detection system (ADS). These episode rules are used to distinguish anomalous sequences of TCP,...
Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize...
By surveying ten best manufacturing enterprises in Shanghai in terms of IT adoptions, the research examines nine classes of total twenty-eight IT infrastructure services employed by these firms. At the end, the IT infrastructure services was analyzed, based on the level, depth, effects and future investment trends.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.