Fuzz testing is often automated, but also frequently augmented by expert...
Binary analyses based on deep neural networks (DNNs), or neural binary
a...
Fuzz testing has been used to find bugs in programs since the 1990s, but...
Designing and implementing secure software is inarguably more important ...
Microcontroller-based embedded devices are at the core of Internet-of-Th...
Contemporary fuzz testing techniques focus on identifying memory corrupt...
Web cache deception (WCD) is an attack proposed in 2017, where an attack...
Modern websites include various types of third-party content such as
Jav...
Numerous surveys have shown that Web users are concerned about the loss ...
Extensions provide useful additional functionality for web browsers, but...
Web developers routinely rely on third-party Java-Script libraries such ...
Relative Path Overwrite (RPO) is a recent technique to inject style
dire...
Control flow integrity (CFI) has received significant attention in the
c...