scispace - formally typeset
Y

Yang Qiang

Publications -  3
Citations -  9

Yang Qiang is an academic researcher. The author has contributed to research in topics: Test method & Control flow graph. The author has an hindex of 2, co-authored 3 publications receiving 9 citations.

Papers
More filters
Patent

Firmware version detection method and vulnerability repair rate evaluation method of internet of things device

TL;DR: In this paper, a firmware version detection method and a vulnerability repair rate evaluation method of an Internet of Things device is presented, which consists of the following steps: S1, acquiring a firmware image file; 2, extracting that file system after decompressing the firmware image files, and determining the Web root directory of each file system; 3, searching Web static resources, respectively extracting eigenvalues of each Web static resource in various firmware versions under each device model, and constructing correspond firmware version characteristic tables; S4, obtaining the IP address list and firmware version characteristics table of the
Patent

Binary code-oriented guided fuzzy test method

TL;DR: In this article, a binary code-oriented guided fuzzy test method is proposed, which comprises the steps of S1, analyzing a target program and marking a target basic block address; s2, loading a binaryprogram, obtaining program address information, disassembling a binarycode to obtain an assembly code, and constructing a program control flow graph; s3, recording a branch skip condition when a program is executed, performing decoding after execution is finished, exporting an execution path, constructing and perfecting a control flow graphs, and updating statistical data of branch execution; s4,
Patent

Binary software protection method based on dynamic code conversion

TL;DR: In this paper, a binary software protection method based on dynamic code conversion is proposed, which comprises the following steps of: S1: extracting the basic block of a code to be protected to obtain pieces; S2: processing the pieces: equally dividing all pieces into two parts including an upper half part and a lower half part, randomly selecting certain pieces from the upper half parts, and initializing the pieces into a ciphertext state, wherein the rest pieces of the corresponding lower half parts of the upperhalf part are under the ciphertext states; and S3: inserting a