Search Results for "-찌라시시초회사㆛(-@hhu9999 )く-웹문서구글도배문의很-구글노출광고업자㆖-마케팅검색전문1페이지い-찌라시1페이지광고到-구글찌라시1페이지도배.-.hum"

Being the Developers’ Friend: Our Experience Developing a High-Precision Tool for Secure Coding

Deep Learning-based Anomaly Detection in Cyber-physical Systems: Progress and Opportunities

Privacy Guarantees of Bluetooth Low Energy Contact Tracing: A Case Study on COVIDWISE

How well does LLM generate security tests?

Crypto-ransomware Detection through Quantitative API-based Behavioral Profiling

Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks

Salman Ahmed, Hans Liljestrand, Hani Jamjoom, Matthew Hicks, N. Asokan, Danfeng Yao: Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented Attacks. USENIX Security Symposium 2023: 1433-1450

SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions

Sazzadur Rahaman, Miles Frantz, Barton P. Miller, Danfeng (Daphne) Yao: SpanL: Creating Algorithms for Automatic API Misuse Detection with Program Analysis Compositions. ACNS Workshops 2023: 515-529

Specializing Neural Networks for Cryptographic Code Completion Applications

Evaluation of Static Vulnerability Detection Tools With Java Cryptographic API Benchmarks

Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?