Tag

vulnerability detection

1 views collected around this technical thread.

AntTech
AntTech
Aug 23, 2023 · Blockchain

Explorations in Web3 Ecosystem Security: Threat Landscape, Research Achievements, and Future Directions

The article reviews the rapid rise of Web3, outlines the severe security challenges and economic losses caused by attacks on cross‑chain bridges, DeFi platforms, and smart contracts, and details Ant Group's Sky Dome Lab research on platform, contract, and client‑side defenses along with future AI‑driven initiatives.

DeFiSmart ContractWeb3
0 likes · 9 min read
Explorations in Web3 Ecosystem Security: Threat Landscape, Research Achievements, and Future Directions
AntTech
AntTech
Apr 20, 2023 · Information Security

Exploring ChatGPT for Smart Contract Vulnerability Detection: Experiments and Analysis

This study investigates the capability of ChatGPT, a large language model, to detect common smart‑contract vulnerabilities, evaluates its performance against traditional tools across multiple datasets, and discusses its strengths, limitations, and future potential in blockchain security auditing.

AIChatGPTSmart Contract
0 likes · 23 min read
Exploring ChatGPT for Smart Contract Vulnerability Detection: Experiments and Analysis
AntTech
AntTech
Apr 19, 2023 · Information Security

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure‑Aware Directed Greybox Fuzzing

The paper presents ODDFuzz, a structure‑aware directed greybox fuzzing framework that combines lightweight static taint analysis with targeted fuzzing to efficiently discover previously unknown Java deserialization (ODD) vulnerabilities, achieving higher recall and precision than existing tools and uncovering six new CVE‑rated bugs in popular Java frameworks.

ODDFuzzdeserializationfuzzing
0 likes · 19 min read
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure‑Aware Directed Greybox Fuzzing
AntTech
AntTech
Nov 7, 2022 · Blockchain

Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning‑Guided Fuzzing

This paper presents a reinforcement‑learning‑based fuzzer (RLF) that generates transaction sequences likely to trigger smart‑contract vulnerabilities, combining vulnerability‑driven and coverage‑driven rewards to improve detection efficiency and outperform existing state‑of‑the‑art tools.

RL-based fuzzerblockchain securityfuzzing
0 likes · 12 min read
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning‑Guided Fuzzing
vivo Internet Technology
vivo Internet Technology
Sep 21, 2022 · Information Security

Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches

The 2022 Vivo Qianjing Cup Cybersecurity Challenge, launched on September 15 under the “Assemble! Geek Youth” theme, invites nationwide security enthusiasts to uncover vulnerabilities in Vivo products through online puzzles and an offline final, offering a 200,000‑yuan prize pool plus uncapped bounty rewards and judging by experts from AWS, Ant Group and leading universities.

cybersecurityinformation securityprivacy protection
0 likes · 5 min read
Vivo Qianjing Cup Cybersecurity Challenge 2022 Launches
System Architect Go
System Architect Go
Mar 2, 2021 · Information Security

OS Command Injection

This article explains what OS command injection is, how it can be detected and exploited on both Linux and Windows systems, demonstrates common payloads and techniques—including blind and out‑of‑band methods—and provides best‑practice defenses to prevent such vulnerabilities.

Defense TechniquesOS command injectionWeb Security
0 likes · 10 min read
OS Command Injection
360 Tech Engineering
360 Tech Engineering
Nov 12, 2019 · Information Security

Improving Product Quality through Code Vulnerability Scanning and Deep Code Search

The article explains why and when to scan product code for vulnerabilities, describes static source‑code and binary scanning methods, introduces deep code‑search techniques, outlines the system architecture and incremental indexing pipeline, and shows how these practices can substantially raise overall product quality.

Code ScanningSphinxcode search
0 likes · 13 min read
Improving Product Quality through Code Vulnerability Scanning and Deep Code Search