Jing-ju Liu

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
Based on secure execution technology provided by Late Launch and modern computer hardware, we propose a software dynamic trustworthy control method, which purpose is to solve trust control problem of key operations at software runtime through strong isolation. Key operations indicate operations that directly access to sensitive data. This method can prevent(More)
Knowledge-based Fuzzing technology successfully applies in software vulnerability mining, however, current Fuzzing technology mainly focuses on fuzzing target software based on single data sample and thus the vulnerability mining results are not stable, false negatives of vulnerability are high and the selection of data sample depends on people's analysis.(More)
  • 1