Results

Looking for more? ProQuest® Dissertations & Theses has additional dissertations and theses.
34 open access dissertations and theses found for:
if(Fuzzing)  »   Refine Search
1.
Fuzzing the Berkeley Packet Filter
by Nilsen, Benjamin Curt, M.S.  University of California, Davis. 2020: 53 pages; 28000762.
2.
Zero-Day Defense: Discovering and Removing Vulnerabilities throughProgram Customization and Fuzzing
by Chen, Yurong, D.Engr.  The George Washington University. 2020: 102 pages; 27740940.
3.
On Fuzzing Concurrent Programs with C++ Atomics
by Snyder, Zachary, M.S.  University of California, Irvine. 2019: 69 pages; 27665167.
4.
Cybersecurity testing and intrusion detection for cyber-physical power systems
by Pan, Shengyi, Ph.D.  Mississippi State University. 2014: 161 pages; 3665497.
5.
Automated Black Box Generation of Structured Inputs for Use in Software Testing
by Dewey, Kyle Thomas, Ph.D.  University of California, Santa Barbara. 2017: 318 pages; 10605739.
6.
Building a Base for Cyber-autonomy
by Shoshitaishvili, Yan, Ph.D.  University of California, Santa Barbara. 2017: 178 pages; 10620012.
7.
Discovery and Remediation of Vulnerabilities in Monolithic IoT Firmware
by Gustafson, Eric D., Ph.D.  University of California, Santa Barbara. 2020: 151 pages; 28025862.
8.
Practical Black-Box Analysis for Network Functions and Services
by Moon, Soo-Jin, Ph.D.  Carnegie Mellon University. 2020: 202 pages; 28148170.
9.
Detection and Prevention of Misuse of Software Components
by Ting, Dai, Ph.D.  National University of Singapore (Singapore). 2015: 141 pages; 10005992.
10.
Elicitation of a Program's Behaviors
by Miles, Craig S., Ph.D.  University of Louisiana at Lafayette. 2015: 134 pages; 10002454.
11.
Automatic Program State Exploration Techniques for Security Analysis of Android Apps
by Johnson, Ryan, Ph.D.  George Mason University. 2019: 211 pages; 27667472.
12.
Analyzing and Securing Embedded Systems
by Spensky, Chad Samuel, Ph.D.  University of California, Santa Barbara. 2020: 168 pages; 28090001.
13.
Random testing of open source C compilers
by Yang, Xuejun, Ph.D.  The University of Utah. 2015: 145 pages; 3704288.
14.
Dynamic prediction of concurrency errors
by Sadowski, Caitlin Harrison, Ph.D.  University of California, Santa Cruz. 2012: 183 pages; 3521816.
15.
Protecting Smart Devices from the Bottom-Up
by Machiry, Aravind K., Ph.D.  University of California, Santa Barbara. 2020: 179 pages; 28092431.
16.
Intrusion Detection in Controller Area Network Bus Using Deep Neural Network
by Sami, Muhammad, M.S.E.E.  California State University, Long Beach. 2020: 62 pages; 27833202.
17.
Light-weight bounds checking
by Misra, Ashish, M.S.  State University of New York at Stony Brook. 2010: 39 pages; 1479996.
18.
Valuables
by Brownell, Rachel Pesavento, M.F.A.  California State University, Long Beach. 2019: 98 pages; 13858508.
20.
Practical Backdoor Attacks and Defenses in Deep Learning Systems
by Yao, Yuanshun, Ph.D.  The University of Chicago. 2020: 181 pages; 28002642.
21.
There Is Nowhere to go but to Arms
by Middleton, Justine, M.F.A.  California State University, Long Beach. 2010: 114 pages; 1486427.
22.
Types for the Chain of Trust: No (Loader) Write Left Behind
by Shapiro, Rebecca, Ph.D.  Dartmouth College. 2018: 221 pages; 10811531.
23.
Effects of Wood Harvesting on Forest Biomass and Carbon Sequestration in West Virginia
by Donahoe, Sean B., Ph.D.  George Mason University. 2011: 257 pages; 3455063.
24.
Post-silicon Functional Validation with Virtual Prototypes
by Cong, Kai, Ph.D.  Portland State University. 2015: 143 pages; 3712209.
27.
Privilege Leakage in Practical Systems
by Grace, Michael C., Ph.D.  North Carolina State University. 2017: 114 pages; 10969800.
28.
Securing Operating Systems Through Utility Virtual Machines
by Denz, Robert, Ph.D.  Dartmouth College. 2016: 222 pages; 10190644.
29.
In-toto: Practical Software Supply Chain Security
by Torres-Arias, Santiago, Ph.D.  New York University Tandon School of Engineering. 2020: 128 pages; 27963570.
30.
An Exploration of Countermeasures to Defend Against Weaponized AI Malware Exploiting Facial Recognition
by Jalaluddin, Arooj Zafar, D.Sc.  Capitol Technology University. 2020: 197 pages; 28094887.
1 - 30 of 34 displayed.
  1    2   Next >
Copyright © 2021 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest