2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon) 2020
DOI: 10.1109/fareastcon50210.2020.9271516
|View full text |Cite
|
Sign up to set email alerts
|

Study of Security Flaws in the Linux Kernel by Fuzzing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…As described by Murray [31], a software program is insecure and imperfect if it "deviates from its intended behavior (e.g., arbitrary code execution), or reveal sensitive data (data leakage), or modify data that should remain protected (integrity violation)." Researchers have conducted research on proving secure software, such as identifying security flaws [32] in protocols and programs and also on transport layer security (TLS) implementations [33], operating system kernels [34], cryptographic algorithms [35], etc.…”
Section: Proof Of Software Security Levelmentioning
confidence: 99%
“…As described by Murray [31], a software program is insecure and imperfect if it "deviates from its intended behavior (e.g., arbitrary code execution), or reveal sensitive data (data leakage), or modify data that should remain protected (integrity violation)." Researchers have conducted research on proving secure software, such as identifying security flaws [32] in protocols and programs and also on transport layer security (TLS) implementations [33], operating system kernels [34], cryptographic algorithms [35], etc.…”
Section: Proof Of Software Security Levelmentioning
confidence: 99%