Automatic detection method of software upgrade vulnerability based on network traffic analysis
During the software upgrade process,the lack of authentication for upgrade information or packages can lead to remote code execution vulnerabilities based on man-in-the-middle attack.An automatic detection method for upgrading vulnerabilities was proposed.The method described the upgrade mechanism b...
Saved in:
Main Authors: | Jinhui TENG, Yan GUANG, Hui SHU, Bing ZHANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2020-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2020004 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Survey on static software vulnerability detection for source code
by: Zhen LI, et al.
Published: (2019-02-01) -
GLOBAL SLUM UPGRADING PRACTICES: IDENTIFYING THE CONTEMPORARY CHALLENGES
by: Anthony C. O. IWEKA, et al.
Published: (2015-06-01) -
Firmware vulnerability analysis based on formal verification of software and hardware
by: Peng-hui ZHANG, et al.
Published: (2016-07-01) -
Research on OLE object vulnerability analysis for RTF file
by: De-guang LE, et al.
Published: (2016-01-01) -
Survey of research on abnormal traffic detection for software defined networks
by: Yu FU, et al.
Published: (2024-03-01)