Do you still need a manual smart contract audit? Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22 スマートコントラクトプログラム解析脅威モデリング 2023.06.21 2025.05.12 Literature Database
Beware of the Unexpected: Bimodal Taint Analysis Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25 ソフトウェアセキュリティプログラム解析脆弱性管理 2023.01.25 2025.05.12 Literature Database
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 データ収集プログラム解析機械学習技術 2023.01.17 2025.05.12 Literature Database
Chatbots in a Honeypot World Authors: Forrest McKee, David Noever | Published: 2023-01-10 サイバー攻撃ハニーポット技術プログラム解析 2023.01.10 2025.05.12 Literature Database
Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11 データプライバシー評価プライバシー保護技術プログラム解析 2023.01.09 2025.05.12 Literature Database
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01 ソフトウェアセキュリティデータフロー解析プログラム解析 2022.12.15 2025.05.12 Literature Database
The Inconvenient Truths of Ground Truth for Binary Analysis Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26 プログラム解析最適化手法関数の定義 2022.10.26 2025.05.12 Literature Database
Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26 プログラム解析動的分析動的脆弱性管理 2022.10.26 2025.05.12 Literature Database
An Efficient Multi-Step Framework for Malware Packing Identification Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17 プログラム解析マルウェア拡散手段動的分析 2022.08.17 2025.05.12 Literature Database
MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12 プログラム解析マルウェア検出手法静的分析 2021.11.28 2025.05.13 Literature Database