- Full text PDF available (0)
- This year (0)
- Last 5 years (1)
- Last 10 years (3)
Journals and Conferences
Fuzz used the concept of black-box testing, is critical to an auto vulnerability mining method, there is blindness in this method. This paper presents a semi-automation model of vulnerability mining based on local fuzz with data stream control and hidden debug technology, the practice shows us that this algorithm makes the fuzz much faster and correct.
As the Multimedia Messaging Service (MMS) is becoming more popular, they become a attractive target for attacker. Unfortunately, at present, there are few tools to analyze the vulnerability of MMS because of the different kinds of agents and the communications trouble of Mobile and PC. This paper presents a novel approach to solve these problem. Our… (More)
Malware are packed to create new variants in order to evade signature-based detector or reverse engineering(RE). According to the primary behaviors of packing, which are code obfuscation,PE formats modification and Anti-technique, a solution-AGUpacker is proposed.