2018
DOI: 10.1007/s11277-018-5959-z
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Vulnerability Analysis Tool Using a Risk Evaluation Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…DAST approach detailing is not as much as agreeable in various examples. From the existing study RanWang et al [82], Park et al [83] are useful approaches in dynamic Analysis. The methods of dynamic analysis are summarized year-wise shows in Fig.…”
Section: ) Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…DAST approach detailing is not as much as agreeable in various examples. From the existing study RanWang et al [82], Park et al [83] are useful approaches in dynamic Analysis. The methods of dynamic analysis are summarized year-wise shows in Fig.…”
Section: ) Discussionmentioning
confidence: 99%
“…They modify all JavaScript highlights and DOM APIs to corrupt the rendering procedure of programs and vectors are inferred to check the vulnerabilities naturally. In the recent study Park, et al [83], a vulnerability detection technique is proposed that develops and manages safe applications and can resolve and analyze these problems. They developed a prototype analysis tool using our technique to test the application's vulnerability-detection ability, and show our proposed technique is superior to existing ones.…”
Section: Fuzzing and Dynamic Analysismentioning
confidence: 99%
“…For memory deallocation primitive, the mutation space of its parameter addr contains the addresses of all the allocated and deallocated chunks in the current state. For the writing primitive, the mutation space of its parameter addr contains the addresses to be controlled in the target state (the definition of target state will be given later), and the mutation space of width is the set [1,2,4,8,16,32,64,128]. en, we input these mutated MOPs into the heap allocator model one by one and process them according to the mapping relationship to obtain the final new program state.…”
Section: Heap Allocator Modelmentioning
confidence: 99%
“…In recent years, due to the deployment of mitigation mechanisms for stack-based vulnerabilities and compiler-level inspections, stack exploits have become increasingly more difficult to execute against hardened programs [5,6]. However, there are still a large number of heap-based vulnerabilities in software written in insecure programming languages such as C and C++ [7][8][9]. ese heap vulnerabilities increase the possibility of malicious attacks and pose a serious threat to software security [10].…”
Section: Introductionmentioning
confidence: 99%