May 16, 2023, 1:10 a.m. | Zhuzhu Wang, Ying Wang

cs.CR updates on arXiv.org arxiv.org

The effectiveness and efficiency of 5G software stack vulnerability and
unintended behavior detection are essential for 5G assurance, especially for
its applications in critical infrastructures. Scalability and automation are
the main challenges in testing approaches and cybersecurity research. In this
paper, we propose an innovative approach for automatically detecting
vulnerabilities, unintended emergent behaviors, and performance degradation in
5G stacks via run-time profiling documents corresponding to fuzz testing in
code repositories. Piloting on srsRAN, we map the run-time profiling via
Logging …

applications assurance automation behavior detection challenges critical cybersecurity detection efficiency fuzzing generated main nlp profiling research run scalability software testing vulnerabilities vulnerability

Sr Security Engineer - Colombia

@ Nubank | Colombia, Bogota

Security Engineer, Investigations - i3

@ Meta | Menlo Park, CA | Washington, DC | Remote, US

Cyber Security Engineer

@ ASSYSTEM | Bridgwater, United Kingdom

Security Analyst

@ Northwestern Memorial Healthcare | Chicago, IL, United States

GRC Analyst

@ Richemont | Shelton, CT, US

Security Specialist

@ Peraton | Government Site, MD, United States