Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. Zhu, X., Wen, S., Jolfaei, A., Haghighi, M. S., Camtepe, S., & Xiang, Y. IEEE Transactions on Network Science and Engineering, IEEE, 2020. bibtex @article{Zhu2020Vulnerability,
title={Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries},
author={Zhu, Xiaogang and Wen, Sheng and Jolfaei, Alireza and Haghighi, Mohammad Sayad and Camtepe, Seyit and Xiang, Yang},
journal={IEEE Transactions on Network Science and Engineering},
year={2020},
publisher={IEEE}
}
Downloads: 0
{"_id":"89AucNbqwTs4RWrAn","bibbaseid":"zhu-wen-jolfaei-haghighi-camtepe-xiang-vulnerabilitydetectioninsiotapplicationsafuzzingmethodontheirbinaries-2020","authorIDs":["M4eG8R33cdkrhn6bL"],"author_short":["Zhu, X.","Wen, S.","Jolfaei, A.","Haghighi, M. S.","Camtepe, S.","Xiang, Y."],"bibdata":{"bibtype":"article","type":"article","title":"Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries","author":[{"propositions":[],"lastnames":["Zhu"],"firstnames":["Xiaogang"],"suffixes":[]},{"propositions":[],"lastnames":["Wen"],"firstnames":["Sheng"],"suffixes":[]},{"propositions":[],"lastnames":["Jolfaei"],"firstnames":["Alireza"],"suffixes":[]},{"propositions":[],"lastnames":["Haghighi"],"firstnames":["Mohammad","Sayad"],"suffixes":[]},{"propositions":[],"lastnames":["Camtepe"],"firstnames":["Seyit"],"suffixes":[]},{"propositions":[],"lastnames":["Xiang"],"firstnames":["Yang"],"suffixes":[]}],"journal":"IEEE Transactions on Network Science and Engineering","year":"2020","publisher":"IEEE","bibtex":"@article{Zhu2020Vulnerability,\n title={Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries},\n author={Zhu, Xiaogang and Wen, Sheng and Jolfaei, Alireza and Haghighi, Mohammad Sayad and Camtepe, Seyit and Xiang, Yang},\n journal={IEEE Transactions on Network Science and Engineering},\n year={2020},\n publisher={IEEE}\n}\n\n","author_short":["Zhu, X.","Wen, S.","Jolfaei, A.","Haghighi, M. S.","Camtepe, S.","Xiang, Y."],"key":"Zhu2020Vulnerability","id":"Zhu2020Vulnerability","bibbaseid":"zhu-wen-jolfaei-haghighi-camtepe-xiang-vulnerabilitydetectioninsiotapplicationsafuzzingmethodontheirbinaries-2020","role":"author","urls":{},"metadata":{"authorlinks":{"jolfaei, a":"https://bibbase.org/show?bib=jolfaei.info%2Fpub.bib"}},"downloads":0},"bibtype":"article","biburl":"https://jolfaei.info/pub.bib","creationDate":"2020-10-31T15:25:59.390Z","downloads":0,"keywords":[],"search_terms":["vulnerability","detection","siot","applications","fuzzing","method","binaries","zhu","wen","jolfaei","haghighi","camtepe","xiang"],"title":"Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries","year":2020,"dataSources":["YHrhASpJsFsNdJpd8","5YWvWPheEotDSpB7L","GKDGf5EvzCjx9wg6A"]}