You are currently on the new version of our website. Access the old version .

6 Results Found

  • Feature Paper
  • Article
  • Open Access
10 Citations
4,350 Views
19 Pages

19 September 2019

Spectre and Meltdown attacks in modern microprocessors represent a new class of attacks that have been difficult to deal with. They underline vulnerabilities in hardware design that have been going unnoticed for years. This shows the weakness of the...

  • Article
  • Open Access
12 Citations
6,366 Views
21 Pages

WTA: A Static Taint Analysis Framework for PHP Webshell

  • Jiazhen Zhao,
  • Yuliang Lu,
  • Xin Wang,
  • Kailong Zhu and
  • Lu Yu

23 August 2021

Webshells are a malicious scripts that can remotely control a webserver to execute arbitrary commands, steal sensitive files, and further invade the internal network. Existing webshell detection methods, such as using pattern matching for webshell de...

  • Article
  • Open Access
1,769 Views
35 Pages

Existing smart contract honeypot detection approaches exhibit high false negatives and positives due to (i) their inability to generate transaction sequences triggering order-dependent traps and (ii) their limited code coverage from traditional fuzzi...

  • Article
  • Open Access
7 Citations
3,248 Views
20 Pages

28 August 2023

With the rapid growth of IoT devices, ensuring the security of embedded firmware has become a critical concern. Despite advances in existing vulnerability discovery methods, previous research has been limited to vulnerabilities occurring in binary pr...

  • Article
  • Open Access
1 Citations
3,630 Views
21 Pages

Go Source Code Vulnerability Detection Method Based on Graph Neural Network

  • Lisha Yuan,
  • Yong Fang,
  • Qiang Zhang,
  • Zhonglin Liu and
  • Yijia Xu

10 June 2025

With the widespread application of the Go language, the demand for vulnerability detection in Go programs is increasing. Existing detection models and methods have deficiencies in extracting source code features of Go programs and mainly focus on det...

  • Article
  • Open Access
5 Citations
3,084 Views
20 Pages

sqlFuzz: Directed Fuzzing for SQL Injection Vulnerability

  • Ye Yuan,
  • Yuliang Lu,
  • Kailong Zhu,
  • Hui Huang,
  • Yuanchao Chen and
  • Yifan Zhang

Fuzz testing technology is an important approach to detecting SQL injection vulnerabilities. Among them, coverage-guided gray-box fuzz testing technology is the current research focus, and has been proved to be an effective method. However, for SQL i...