|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6048 occurrences of 3544 keywords
|
|
|
Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
47 | Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Thomas W. Reps, Randal E. Bryant |
Automatic discovery of API-level exploits. |
ICSE |
2005 |
DBLP DOI BibTeX RDF |
API-level exploit, bounded model checking |
45 | Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker |
Beyond heuristics: learning to classify vulnerabilities and predict exploits. |
KDD |
2010 |
DBLP DOI BibTeX RDF |
SVM, supervised learning, vulnerabilities, exploits |
39 | Stéphane Duverger |
Linux 2.6 kernel exploits. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker |
Finding diversity in remote code injection exploits. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
binary emulation, malware classification, worms, phylogeny, bots |
31 | Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu |
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Worm Protection, API Hooking, System Security |
30 | Adam D. Todd, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Steven K. Rogers |
Alert Verification Evasion Through Server Response Forging. |
RAID |
2007 |
DBLP DOI BibTeX RDF |
Alert Verification, Network Intrusion Detection, Exploits, Evasion |
30 | Iván Arce |
The Shellcode Generation. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
taxonomy of attacks, exploitation program, attack, exploits |
30 | Stuart E. Schechter, Michael D. Smith 0001 |
How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Theft, Exploits, Threat Models, Security Economics |
27 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Helen J. Wang, Chuanxiong Guo, Daniel R. Simon, Alf Zugenmaier |
Shield: vulnerability-driven network filters for preventing known vulnerability exploits. |
SIGCOMM |
2004 |
DBLP DOI BibTeX RDF |
generic protocol analyzer, network filter, vulnerability signature, worm defense, patching |
26 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
26 | Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay |
Probability of Attack Based on System Vulnerability Life Cycle. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA |
26 | Jose Nazario |
Where the worms aren't. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
securty, worms, vulnerabilities, botnets, exploits |
26 | Prabhaker Mateti |
A laboratory-based course on internet security. |
SIGCSE |
2003 |
DBLP DOI BibTeX RDF |
TCP/IP exploits, network security, ethics, firewalls, buffer overflow, internet security |
24 | Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
Analyzing network traffic to detect self-decrypting exploit code. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
exploit code, static analysis, emulation, detection, polymorphic, decryption |
24 | Paul Ammann, Duminda Wijesekera, Saket Kaushik |
Scalable, graph-based network vulnerability analysis. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
monotonic analysis, model checking, scalability, network security, vulnerability, exploit |
23 | Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu |
Detecting Remote Exploits Using Data Mining. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
Server attacks, exploit code, data mining, attack detection |
23 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi |
Diversified Process Replicæ for Defeating Memory Error Exploits. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AVARE: aggregated vulnerability assessment and response against zero-day exploits. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Jedidiah R. Crandall, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
metamorphism, polymorphism, symbolic execution, worms, honeypots, polymorphic worms |
23 | Alf Zugenmaier |
Countering Automated Exploits with System Security CAPTCHAS. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Giovanni Vigna, William K. Robertson, Davide Balzarotti |
Testing network-based intrusion detection signatures using mutant exploits. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, security testing, quality metrics |
19 | Islam Obaidat, Meera Sridhar, Fatemeh Tavakoli |
DAEDALUS: Defense Against Firmware ROP Exploits Using Stochastic Software Diversity. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Seth Copen Goldstein, Sixiang Gao, Zhenbo Sun |
BlockGraph: a scalable secure distributed ledger that exploits locality. |
Distributed Parallel Databases |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Christoforos Prasatzakis, Theodore Patkos, Dimitris Plexousakis |
An Intuitive Architecture for a Chatbot that Exploits High-Level Reasoning for Human?Robot Interaction. |
ERCIM News |
2023 |
DBLP BibTeX RDF |
|
19 | Cainã Figueiredo, João Gabriel Lopes de Oliveira, Rodrigo Azevedo Santos, Daniel Vieira, Lucas Miranda, Gerson Zaverucha, Leandro Pfleger de Aguiar, Daniel Sadoc Menasché |
A Statistical Relational Learning Approach Towards Products, Software Vulnerabilities and Exploits. |
IEEE Trans. Netw. Serv. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zihao Liu, Arash Moradinegade Dizqah, Jose M. Herreros, Joschka Schaub, Olivier C. L. Haas |
A Hierarchical Economic Model Predictive Controller That Exploits Look-Ahead Information of Roads to Boost Engine Performance. |
IEEE Trans. Control. Syst. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Hadi Eskandari, Michael Bewong, Sabih ur Rehman |
OutCenTR: A novel semi-supervised framework for predicting exploits of vulnerabilities in high-dimensional datasets. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Andrei Costin, Syed Khandker, Hannu Turtiainen, Timo Hämäläinen 0002 |
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon |
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. |
ACM Trans. Softw. Eng. Methodol. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu 0004, Hongpeng Bai, Kai Chen 0012, Ran Wang, Wei Wang 0012, Kaitai Liang, Weizhe Wang, Weizhi Meng 0001, Shaoying Liu |
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Zhongyu Pei, Xingman Chen, Songtao Yang, Haixin Duan, Chao Zhang 0008 |
TAICHI: Transform Your Secret Exploits Into Mine From a Victim's Perspective. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Prabith GS, S. Abhishek, Anjali T, Radhika Ravindran |
Zero-Click Exploits and Malware: An In-Depth Analysis and Case Studies. |
SIN |
2023 |
DBLP DOI BibTeX RDF |
|
19 | K. Mohamed Sharaafat, Yi Ling Celeste Lau, Sebastian Wong, Yu Tan, Muhammad Khairin Bin Mohd, Isaac Medina Agatep, Zhiyuan Zhang 0004, Huaqun Guo |
Data Crawling for Malware Analysis for Holistic Prevention of Future Exploits. |
ICCCS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Artur Balsam, Maciej Roman Nowak, Michal Walkowski, Jacek Oko, Slawomir Sujecki |
Analysis of CVSS Vulnerability Base Scores in the Context of Exploits' Availability. |
ICTON |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xiaoming Ruan, Yaoxiang Yu, Wenhao Ma, Bo Cai |
Prompt Learning for Developing Software Exploits. |
Internetware |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Andrei Costin, Hannu Turtiainen, Syed Khandkher, Timo Hämäläinen 0002 |
Cybersecurity of COSPAS-SARSAT and EPIRB: threat and attacker models, exploits, future research. |
SpaceSec |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Richard Ward, Andrew Johnson 0008 |
Identifying Microbenchmark Signatures of Existing Microarchitectural Exploits Using the Unified Side Channel Attack - Model (USCA-M) Four-Phase Testing Process. |
ISDFS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Shi-Ming Lu, Hsuan-Jung Su, Ming-Ting Chen |
An Adaptive Duplex Switching Scheme That Exploits Interference Statistics for Hybrid-Duplex Cellular Networks. |
WPMC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Eric Pauley, Paul Barford, Patrick D. McDaniel |
The CVE Wayback Machine: Measuring Coordinated Disclosure from Exploits against Two Years of Zero-Days. |
IMC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Talal Halabi, Mohammad Zulkernine |
The Ultimate Battle Against Zero-Day Exploits: Toward Fully Autonomous Cyber-Physical Defense. |
SSE |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Carlo Baldassi |
Recombinator-k-Means: An Evolutionary Algorithm That Exploits k-Means++ for Recombination. |
IEEE Trans. Evol. Comput. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Marko Rogge |
0-Day-Exploits - Bange machen gilt nicht. |
Wirtschaftsinformatik Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa |
Guaranteeing Network Reliability to 0-Day Exploits Using Cost-Effective Heterogeneous Node Migration. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shaochen Wang, Zhangli Zhou, Zhen Kan |
When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. |
IEEE Robotics Autom. Lett. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Tin Lai, Fabio Ramos 0001 |
Adaptively Exploits Local Structure With Generalised Multi-Trees Motion Planning. |
IEEE Robotics Autom. Lett. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Sagar Samtani, Yidong Chai, Hsinchun Chen |
Linking Exploits from the Dark Web to Known Vulnerabilities for Proactive Cyber Threat Intelligence: An Attention-Based Deep Structured Semantic Model. |
MIS Q. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Shaochen Wang, Zhangli Zhou, Zhen Kan |
When Transformer Meets Robotic Grasping: Exploits Context for Efficient Grasp Detection. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yang Su, Damith C. Ranasinghe |
Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon |
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Soufian El Yadmani, Robin The, Olga Gadyatskaya |
How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jonah Burgess |
Malware and Exploits on the Dark Web. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Huan He, Shifan Zhao, Ziyuan Tang, Joyce C. Ho, Yousef Saad, Yuanzhe Xi |
An Efficient Nonlinear Acceleration method that Exploits Symmetry of the Hessian. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Marek Janiszewski, Marcin Rytel, Piotr Lewandowski, Hubert Romanowski |
Creating vulnerabilities and exploits database of IoT devices. |
EICC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Leona McNulty, Vassilios G. Vassilakis |
IoT Botnets: Characteristics, Exploits, Attack Capabilities, and Targets. |
CSNDSP |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Serge Demeyer, Henrique Rocha, Darin Verheijke |
Refactoring Solidity Smart Contracts to Protect Against Reentrancy Exploits. |
ISoLA (2) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jie Fu |
On Almost-Sure Intention Deception Planning that Exploits Imperfect Observers. |
GameSec |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Swati Kiran Rajput, R. Umamageswari, Rajesh Singh 0001, Lalit Thakur, C. P. Sanjay, Maddikera Kalyan Chakravarthi |
Understanding IoT Security: A Point-by-point Investigation of IoT Weaknesses and a First Exact Glance at Web Scale IoT Exploits. |
IC3I |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Matteo Italia, Fabio Dercole |
Optimal control of two cytotoxic drug maximum tolerated dose steers and exploits cancer adaptive resistance in a cell-based framework. |
ECC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. |
USENIX Security Symposium |
2022 |
DBLP BibTeX RDF |
|
19 | Chen Yan 0001, Zhijian Xu, Zhanyuan Yin, Xiaoyu Ji 0001, Wenyuan Xu 0001 |
Rolling Colors: Adversarial Laser Exploits against Traffic Light Recognition. |
USENIX Security Symposium |
2022 |
DBLP BibTeX RDF |
|
19 | Yang Su, Damith C. Ranasinghe |
Leaving Your Things Unattended is No Joke! Memory Bus Snooping and Open Debug Interface Exploits. |
PerCom Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Jakob Bleier, Katsunari Yoshioka, Martina Lindorfer, Michel van Eeten, Carlos Hernandez Gañán |
No Spring Chicken: Quantifying the Lifespan of Exploits in IoT Malware Using Static and Dynamic Analysis. |
AsiaCCS |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Amirreza Yousefzadeh, Manolis Sifalakis |
Delta Activation Layer exploits temporal sparsity for efficient embedded video processing. |
IJCNN |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Benjamin Drozdenko, Makia Powell |
Utilizing Deep Learning Techniques to Detect Zero Day Exploits in Network Traffic Flows. |
UEMCON |
2022 |
DBLP DOI BibTeX RDF |
|
19 | David Klein, Marius Musch, Thomas Barber, Moritz Kopmann, Martin Johns |
Accept All Exploits: Exploring the Security Impact of Cookie Banners. |
ACSAC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Prashant Anantharaman |
Protecting Systems From Exploits Using Language-Theoretic Security. |
|
2022 |
RDF |
|
19 | Tom McVey |
Browser exploits: ensuring safety when surfing. |
Netw. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre |
TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity. |
SIAM J. Optim. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jie Wang 0037, Victor Magron, Jean-Bernard Lasserre |
Chordal-TSSOS: A Moment-SOS Hierarchy That Exploits Term Sparsity with Chordal Extension. |
SIAM J. Optim. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Wooseung Nam, Joohyun Lee, Ness B. Shroff, Kyunghan Lee |
An Inter-Data Encoding Technique that Exploits Synchronized Data for Network Applications. |
IEEE Trans. Mob. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Guanhua Wang, Hideaki Hata, Muhammad Ali Babar 0001 |
Revenue maximizing markets for zero-day exploits. |
Auton. Agents Multi Agent Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Yasmany Prieto, Miguel E. Figueroa, Jorge E. Pezoa |
Maximizing Network Reliability to 0-Day Exploits Through a Heterogeneous Node Migration Strategy. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Hallal, Mariette Awad, Pierre H. Khoueiry |
TempoMAGE: a deep learning framework that exploits the causal dependency between time-series data to predict histone marks in open chromatin regions at time-points with missing ChIP-seq datasets. |
Bioinform. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tin Lai |
Rapidly-exploring Random Forest: Adaptively Exploits Local Structure with Generalised Multi-Trees Motion Planning. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Vittorio Lippi |
Deep Learning Based Model Identification System Exploits the Modular Structure of a Bio-Inspired Posture Control Model for Humans and Humanoids. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Octavian Suciu, Connor Nelson, Zhuoer Lyu, Tiffany Bao, Tudor Dumitras |
Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Stephen B. Wicker |
The ethics of zero-day exploits - : the NSA meets the trolley car. |
Commun. ACM |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Jan Van den Herrewegen, David F. Oswald, Flavio D. Garcia, Qais Temeiza |
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis. |
IACR Trans. Cryptogr. Hardw. Embed. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Kjell Hausken, Jonathan W. Welburn |
Attack and Defense Strategies in Cyber War Involving Production and Stockpiling of Zero-Day Cyber Exploits. |
Inf. Syst. Frontiers |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Vittorio Lippi |
Deep Learning based Model Identification System Exploits the Modular Structure of a Bio-inspired Posture Control Model for Humans and Humanoids. |
ICPRAM |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cainã Figueiredo, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar |
Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning Approach. |
CSR |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Cristian Toma, Catalin Boja, Marius Popa, Mihai Doinea, Cristian Ciurea |
Viruses, Exploits, Malware and Security Issues on IoT Devices. |
SecITC |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Carter Yagemann, Matthew Pruett, Simon P. Chung, Kennon Bittick, Brendan Saltaformaggio, Wenke Lee |
ARCUS: Symbolic Root Cause Analysis of Exploits in Production Systems. |
USENIX Security Symposium |
2021 |
DBLP BibTeX RDF |
|
19 | Shangcheng Shi, Xianbo Wang, Kyle Zeng, Ronghai Yang, Wing Cheong Lau |
An Empirical Study on Mobile Payment Credential Leaks and Their Exploits. |
SecureComm (2) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Bramwell Brizendine, Austin Babcock |
A Novel Method for the Automatic Generation of JOP Chain Exploits. |
NCS |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Josh Huddleston, Pu Ji, Suman Bhunia, Joel Cogan |
How VMware Exploits Contributed to SolarWinds Supply-chain Attack. |
CSCI |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Pin Lyu, Wandong Cai, Yao Wang 0005 |
Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures. |
ADHOCNETS/TRIDENTCOM |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Tuong Phi Lau |
Software Reuse Exploits in Node.js Web Apps. |
ICSRS |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Salman Ahmed 0001, Long Cheng 0005, Hans Liljestrand, N. Asokan, Danfeng Daphne Yao |
Tutorial: Investigating Advanced Exploits for System Security Assurance. |
SecDev |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Falin Hou, Xiao Yu, Kefan Qiu, Junli Liu, Zhiwei Shi, Yuanzhang Li |
Research on Off-Path Exploits of Network Protocols. |
DMBD (1) |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Asmit De, Mohammad Nasim Imtiaz Khan, Karthikeyan Nagarajan, Swaroop Ghosh |
HarTBleed: Using Hardware Trojans for Data Leakage Exploits. |
IEEE Trans. Very Large Scale Integr. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao |
Hardware Security in Spin-based Computing-in-memory: Analysis, Exploits, and Mitigation Techniques. |
ACM J. Emerg. Technol. Comput. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Ali Babar 0001 |
Revenue Maximizing Markets for Zero-Day Exploits. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Mingyu Guo, Hideaki Hata, Ali Babar 0001 |
Optimizing Affine Maximizer Auctions via Linear Programming: an Application to Revenue Maximizing Mechanism Design for Zero-Day Exploits Markets. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Xuewei Feng, Chuanpu Fu, Qi Li 0002, Kun Sun 0001, Ke Xu 0002 |
Off-Path TCP Exploits of the Mixed IPID Assignment. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
19 | Xueyan Wang, Jianlei Yang 0001, Yinglin Zhao, Xiaotao Jia, Gang Qu 0001, Weisheng Zhao |
Hardware Security in Spin-Based Computing-In-Memory: Analysis, Exploits, and Mitigation Techniques. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 5956 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|