Search Results for "-㎞구글-찌라시-@hhu9999-부산달리기1페이지노출-.mvn"

Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE

How well does LLM generate security tests?

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks

Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao: Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450

SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions

Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao: SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529

Specializing Neural Networks for Cryptographic Code Completion Applications

Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks

Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?