PG-VulNet: Detect Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs
we design and implement PG-VulNet, a tool for detecting Supply Chain Vulnerabilities in IoT Devices using Pseudo-code and Graphs.
An Empirical Study on Implicit Constraints in Smart Contract Static Analysis
Smart contracts static vulnerability detection
Mining Trojan Monitoring of CERNET
AbstractMining Trojan Monitoring of CERNET, by analyzing NetFlow data from CERNET network node, we managed to monitor the network traffic of mining trojans in CERNET, and build a visual monitoring system that can track the distribution of mining behaviors in CERNET. This system provides the geographical distribution of global mining pool addresses, the daily monitoring of mining traffic and the statistics of the mining behaviors of schools and institutions in CERNET. We will pay close attention and continue to update this page for a long time, and actively contribute to the maintenance of the network security of the education network.
ROLoad: Securing Sensitive Operations with Pointee Integrity
Protect sensitive operations with hardware support.