|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Julia Wunder, Andreas Kurtz 0004, Christian Eichenmüller, Freya Gassmann, Zinaida Benenson |
Shedding Light on CVSS Scoring Inconsistencies: A User-Centric Study on Evaluating Widespread Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.15259, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Majd Soud, Grischa Liebel, Mohammad Hamdaqa |
PrAIoritize: Learning to Prioritize Smart Contract Bugs and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.11082, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Madhu Selvaraj, Gias Uddin 0001 |
A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.13141, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Asmit Nayak, Rishabh Khandelwal, Kassem Fawaz |
Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.16321, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Domenico Cotroneo, Cristina Improta, Pietro Liguori, Roberto Natella |
Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.04451, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kobra Khanmohammadi, Raphaël Khoury |
Half-Day Vulnerabilities: A study of the First Days of CVE Entries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.07990, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiashu Xu, Mingyu Derek Ma, Fei Wang 0060, Chaowei Xiao, Muhao Chen |
Instructions as Backdoors: Backdoor Vulnerabilities of Instruction Tuning for Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.14710, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Irdin Pekaric, Michael Felderer, Philipp Steinmüller |
VULNERLIZER: Cross-analysis Between Vulnerabilities and Software Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.09649, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse K. Coskun, Gianluca Stringhini |
Can Large Language Models Identify And Reason About Security Vulnerabilities? Not Yet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.12575, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen 0001, Lingling Fan 0003, Lida Zhao, Jiahui Wu, Yang Liu 0003 |
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.08434, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chinazunwa Uwaoma |
On Security Strategies for Addressing Potential Vulnerabilities in 6G Technologies Deployable in Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.16714, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tiehua Zhang, Rui Xu, Jianping Zhang, Yuzhe Tian, Xin Chen, Xiaowei Huang, Jun Yin, Xi Zheng 0001 |
DSHGT: Dual-Supervisors Heterogeneous Graph Transformer - A pioneer study of using heterogeneous graph learning for detecting software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.01376, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yang Li, Anna Maria Mandalari, Isabel Straw |
Who Let the Smart Toaster Hack the House? An Investigation into the Security Vulnerabilities of Consumer IoT Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.09017, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | wala Draidi Areed, Aiden Price, Kathryn Arnett, M. Helen Thompson, Reid Malseed, Kerrie L. Mengersen |
Assessing the Spatial Structure of the Association between Attendance at Preschool and Childrens Developmental Vulnerabilities in Queensland Australia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.15746, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Attia Qammar, Hongmei Wang, Jianguo Ding, Abdenacer Naouri, Mahmoud Daneshmand, Huansheng Ning |
Chatbots to ChatGPT in a Cybersecurity Space: Evolution, Vulnerabilities, Attacks, Challenges, and Future Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.09255, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Callum Mole, Ed Chalstrey, Peter Foster, Tim Hobson |
Digital identity architectures: comparing goals and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.09988, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tianyu Chen, Lin Li, Bingjie Shan, Guangtai Liang, Ding Li, Qianxiang Wang, Tao Xie 0001 |
Identifying Vulnerable Third-Party Libraries from Textual Descriptions of Vulnerabilities and Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.08206, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yihao Chen, Jiahuei Lin, Bram Adams, Ahmed E. Hassan |
Why Not Mitigate Vulnerabilities in Helm Charts? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.15350, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | John Harshith, Mantej Singh Gill, Madhan Jothimani |
Evaluating the Vulnerabilities in ML systems in terms of adversarial attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.12918, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Christopher West, Ivy Vecna, Raiyan Chowdhury |
Random (Un)rounding : Vulnerabilities in Discrete Attribute Disclosure in the 2021 Canadian Census. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.13859, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Erfan Darzi, Florian Dubost, Nanna Maria Sijtsema, Peter M. A. van Ooijen |
The Hidden Adversarial Vulnerabilities of Medical Federated Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.13893, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Avishree Khare, Saikat Dutta, Ziyang Li, Alaia Solko-Breslin, Rajeev Alur, Mayur Naik |
Understanding the Effectiveness of Large Language Models in Detecting Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.16169, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Bart Pleiter, Behrad Tajalli, Stefanos Koffas, Gorka Abad, Jing Xu, Martha A. Larson, Stjepan Picek |
Tabdoor: Backdoor Vulnerabilities in Transformer-based Neural Networks for Tabular Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.07550, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Michael Fu, Trung Le, Van Nguyen 0002, Chakkrit Tantithamthavorn, Dinh Q. Phung |
Learning to Quantize Vulnerability Patterns and Match to Locate Statement-Level Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.06109, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hussain Ahmad, Isuru Dharmadasa, Faheem Ullah, Muhammad Ali Babar 0001 |
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 55(9), pp. 192:1-192:38, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Richard G. Mathieu, Alan E. Turovlin |
Lost in the middle - a pragmatic approach for ERP managers to prioritize known vulnerabilities by applying classification and regression trees (CART). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Comput. Secur. ![In: Inf. Comput. Secur. 31(5), pp. 655-674, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Imen Sayar, Alexandre Bartel, Eric Bodden, Yves Le Traon |
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 32(1), pp. 25:1-25:45, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mahmoud Alfadel, Diego Elias Costa, Emad Shihab, Bram Adams |
On the Discoverability of npm Vulnerabilities in Node.js Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 32(4), pp. 91:1-91:27, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hongyi Pu, Liang He 0002, Peng Cheng 0001, Mingyang Sun, Jiming Chen 0001 |
Security of Industrial Robots: Vulnerabilities, Attacks, and Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Netw. ![In: IEEE Netw. 37(1), pp. 111-117, January / February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Gianpiero Costantino, Ilaria Matteucci |
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(1), pp. 33-49, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nikolay Karapetyants, Dmitry Efanov |
A practical approach to learning Linux vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(3), pp. 409-418, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Buxiang Zhou, Binjie Sun, Tianlei Zang, Yating Cai, Jiale Wu, Huan Luo |
Security Risk Assessment Approach for Distribution Network Cyber Physical Systems Considering Cyber Attack Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(1), pp. 47, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Martin R. Albrecht, Sofía Celi, Benjamin Dowling, Daniel Jones |
Practically-exploitable Cryptographic Vulnerabilities in Matrix. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 485, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Sarani Bhattacharya, Dilip Kumar Shanmugasundaram Veeraraghavan, Shivam Bhasin, Debdeep Mukhopadhyay |
Uncovering Vulnerabilities in Smartphone Cryptography: A Timing Analysis of the Bouncy Castle RSA Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 135, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Robertas Maleckas, Kenneth G. Paterson, Martin R. Albrecht |
Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1118, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Felix Schuckert, Basel Katt, Hanno Langweg |
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 128, pp. 103121, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jonathan M. Spring |
An analysis of how many undiscovered vulnerabilities remain in information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 131, pp. 103191, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Katarzyna Filus, Joanna Domanska |
Software vulnerabilities in TensorFlow-based deep learning applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 124, pp. 102948, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Abhishek Sharma, Sangeeta Sabharwal, Sushama Nagpal |
A hybrid scoring system for prioritization of software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 129, pp. 103256, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zaina Abuabed, Ahmad S. Alsadeh, Adel Taweel |
STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 133, pp. 103391, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis |
Topic and influence analysis on technological patents related to security vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 128, pp. 103128, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang 0008 |
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 124, pp. 102995, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury |
SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 125, pp. 103028, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Stefano Silvestri, Shareeful Islam, Spyridon Papastergiou, Christos Tzagkarakis, Mario Ciampi |
A Machine Learning Approach for the NLP-Based Analysis of Cyber Threats and Vulnerabilities of the Healthcare Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(2), pp. 651, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hugo Riggs, Shahid Tufail, Imtiaz Parvez, Mohd Tariq, Mohammed Aquib Khan, Asham Amir, Kedari Vineetha Vuda, Arif I. Sarwat |
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(8), pp. 4060, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Damilola Oladimeji, Amar Rasheed, Cihan Varol, Mohamed Baza, Hani Alshahrani, Abdullah Baz |
CANAttack: Assessing Vulnerabilities within Controller Area Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(19), pp. 8223, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ismael Delgado, Elio San Cristóbal, Sergio Martín 0001, Antonio Robles-Gómez |
Exploring IoT Vulnerabilities in a Comprehensive Remote Cybersecurity Laboratory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(22), pp. 9279, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Muhammad Muzamil Aslam, Ali Tufail, Ki-Hyung Kim, Rosyzie Anna Awg Haji Mohd Apong, Muhammad Taqi Raza |
A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(18), pp. 7999, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zihua Song, Junfeng Wang 0003, Kaiyuan Yang 0004, Jigang Wang |
HGIVul: Detecting inter-procedural vulnerabilities based on hypergraph convolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Softw. Technol. ![In: Inf. Softw. Technol. 160, pp. 107219, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hanting Chu, Pengcheng Zhang, Hai Dong, Yan Xiao 0002, Shunhui Ji, Wenrui Li |
A survey on smart contract vulnerabilities: Data sources, detection and repair. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Softw. Technol. ![In: Inf. Softw. Technol. 159, pp. 107221, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Francesco Parolini, Antoine Miné |
Sound static analysis of regular expressions for vulnerabilities to denial of service attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 229, pp. 102960, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Peng Liu 0044, Wenzhe Ye, Haiying Duan, Xianxian Li, Shuyi Zhang, Chuanjian Yao, Yongnan Li |
Graph neural network based approach to automatically assigning common weakness enumeration identifiers for vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybersecur. ![In: Cybersecur. 6(1), pp. 29, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Xiong, Yifei Zhu, Zhangying Zeng, Xinqi Yang |
Signal Game Analysis between Software Vendors and Third-Party Platforms in Collaborative Disclosure of Network Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex. ![In: Complex. 2023, pp. 1027215:1-1027215:11, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Luiza Odete Herback de Carvalho Macedo, Miguel Elias M. Campista |
Attacks to mobile networks using SS7 vulnerabilities: a real traffic analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 83(3), pp. 253-265, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Majid Salehi, Luca Degani, Marco Roveri, Danny Hughes 0001, Bruno Crispo |
Discovery and Identification of Memory Corruption Vulnerabilities on Bare-Metal Embedded Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(2), pp. 1124-1138, March - April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ling Jin, Yinzhi Cao, Yan Chen 0004, Di Zhang, Simone Campanoni |
ExGen: Cross-platform, Automated Exploit Generation for Smart Contract Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(1), pp. 650-664, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Soumyadeep Hore, Fariha Moomtaheen, Ankit Shah 0002, Xinming Ou |
Towards Optimal Triage and Mitigation of Context-Sensitive Cyber Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(2), pp. 1270-1285, March - April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xiguo Gu, Liwei Zheng, Huiwen Yang, Shifan Liu, Zhanqi Cui |
OC-Detector: Detecting Smart Contract Vulnerabilities Based on Clustering Opcode Instructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 33(11&12), pp. 1673-1700, November & December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Akshat Jain, Prasanna Shete |
Accounting for the Unaccounted Vulnerabilities Found in Endpoint ISP SOHO Router. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCST ![In: IEEE International Carnahan Conference on Security Technology, ICCST 2023, Pune, India, October 11-15, 2023, pp. 1-4, 2023, IEEE, 979-8-3503-1587-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shams Tabrez Siddiqui, Mohammad Shahid Kamal, Khalid Ali Qidwai, Md Imran Alam, Haneef Khan, Malik Zaib Alam, Ishan Budhiraja, Sandeep Chintham |
Uncovering Network Vulnerabilities and Conducting Digital Forensics Analysis for IoT Device Security in 6G. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ANTS ![In: IEEE International Conference on Advanced Networks and Telecommunications Systems, ANTS 2023, Jaipur, India, December 17-20, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0767-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Marwan Omar, Stavros Shiaeles |
VulDetect: A novel technique for detecting software vulnerabilities using Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023, pp. 105-110, 2023, IEEE, 979-8-3503-1170-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zaynab Lamoyero, Oluwatobi Fajana |
Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSR ![In: IEEE International Conference on Cyber Security and Resilience, CSR 2023, Venice, Italy, July 31 - Aug. 2, 2023, pp. 275-280, 2023, IEEE, 979-8-3503-1170-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | C. G. Frédéric Bogaerts, Naghmeh Ivaki, José Fonseca 0002 |
Using AI to Inject Vulnerabilities in Python Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN-W ![In: 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2023 - Workshops, Porto, Portugal, June 27-30, 2023, pp. 223-230, 2023, IEEE, 979-8-3503-2543-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiadong Lou, Xiaohan Zhang, Yihe Zhang, Xinghua Li, Xu Yuan 0001, Ning Zhang 0017 |
Devils in Your Apps: Vulnerabilities and User Privacy Exposure in Mobile Notification Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023, pp. 28-41, 2023, IEEE, 979-8-3503-4793-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xingchen Chen, Baizhu Wang, Ze Jin, Yun Feng, Xianglong Li, Xincheng Feng, Qixu Liu |
Tabby: Automated Gadget Chain Detection for Java Deserialization Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, DSN 2023, Porto, Portugal, June 27-30, 2023, pp. 179-192, 2023, IEEE, 979-8-3503-4793-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yuanpeng Wang, Ziqi Zhang, Ningyu He, Zhineng Zhong, Shengjian Guo, Qinkun Bao, Ding Li 0001, Yao Guo 0001, Xiangqun Chen |
SymGX: Detecting Cross-boundary Pointer Vulnerabilities of SGX Applications via Static Symbolic Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 2710-2724, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chuanqi Xu, Ferhat Erata, Jakub Szefer |
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 579-593, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice |
A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1690-1704, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tejas Kannan, Nick Feamster, Henry Hoffmann |
Prediction Privacy in Distributed Multi-Exit Neural Networks: Vulnerabilities and Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1123-1137, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rauli Kaksonen, Kimmo Halunen, Juha Röning |
Vulnerabilities in IoT Devices, Backends, Applications, and Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 9th International Conference on Information Systems Security and Privacy, ICISSP 2023, Lisbon, Portugal, February 22-24, 2023, pp. 659-668, 2023, SciTePress, 978-989-758-624-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Santoshi Rudrakar, Parag Rughani, Jeet Rami |
UART Port Bane or Boon: Vulnerabilities vs Significance for Digital Investigation in Ag-IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: 16th International Conference on Security of Information and Networks, SIN 2023, Jaipur, India, November 20-21, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-4321-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jackson Lim, Yi Lin Lau, Leshawn Khin Ming Chan, Jia Ming Tristan Paul Goo, Huahua Zhang, Zhiyuan Zhang 0004, Huaqun Guo |
CVE Records of Known Exploited Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCS ![In: 8th International Conference on Computer and Communication Systems, ICCCS 2023, Guangzhou, China, April 21-23, 2023, pp. 738-743, 2023, IEEE, 978-1-6654-5612-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Natarajan Krishnaraj, Chirag Madaan, Sanjana Awasthi, Raggav Subramani, Harsh Avinash, Sankalp Mukim |
Common vulnerabilities in real world web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
doors ![In: Proceedings of the 3rd Edge Computing Workshop, Zhytomyr, Ukraine, April 7, 2023., pp. 9-22, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Shams Tarek, Hasan Al Shaikh, Sree Ranjani Rajendran, Farimah Farahmandi |
Benchmarking of SoC-Level Hardware Vulnerabilities: A Complete Walkthrough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2023, Foz do Iguacu, Brazil, June 20-23, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-2769-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Regner Sabillon, Juan Ramón Bermejo Higuera |
The Importance of Cybersecurity Awareness Training in the Aviation Industry for Early Detection of Cyberthreats and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (53) ![In: HCI International 2023 - Late Breaking Papers - 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part VI, pp. 461-479, 2023, Springer, 978-3-031-48056-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Utku Tefek, Ertem Esiner, Carmen Cheh, Daisuke Mashima |
A Smart Grid Ontology: Vulnerabilities, Attacks, and Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3945-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | M. Mehdi Kholoosi, Muhammad Ali Babar 0001, Cemal Yilmaz |
Empirical Analysis of Software Vulnerabilities Causing Timing Side Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNS ![In: IEEE Conference on Communications and Network Security, CNS 2023, Orlando, FL, USA, October 2-5, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-3945-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Suliman Alazmi, Daniel Conte de Leon |
Customizing OWASP ZAP: A Proven Method for Detecting SQL Injection Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSecurity/HPSC/IDS ![In: 9th Intl Conference on Big Data Security on Cloud, BigDataSecurity, IEEE Intl Conference on High Performance and Smart Computing, HPSC and IEEE Intl Conference on Intelligent Data and Security IDS 2023, New York, NY, USA, May 6-8, 2023, pp. 102-106, 2023, IEEE, 979-8-3503-1293-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Toru Sakon, Yukikazu Nakamoto |
Structured Specification Framework for the Attacks, Weaknesses, and Vulnerabilities of Vehicle E&E systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC2023-Spring ![In: 97th IEEE Vehicular Technology Conference, VTC Spring 2023, Florence, Italy, June 20-23, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-1114-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Bui Van Cong, Cho Do Xuan |
Detecting Software Vulnerabilities Based on Source Code Analysis using GCN Transformer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIVF ![In: International Conference on Computing and Communication Technologies, RIVF 2023, Hanoi, Vietnam, December 23-25, 2023, pp. 112-117, 2023, IEEE, 979-8-3503-1584-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sree Ranjani Rajendran, Shams Tarek, Benjamin M. Hicks, Hadi Mardani Kamali, Farimah Farahmandi, Mark M. Tehranipoor |
HUnTer: Hardware Underneath Trigger for Exploiting SoC-level Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation & Test in Europe Conference & Exhibition, DATE 2023, Antwerp, Belgium, April 17-19, 2023, pp. 1-6, 2023, IEEE, 978-3-9819263-7-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Annika Nykänen, Andrei Costin |
A View on Vulnerabilities Within IoT Devices in the Smart Home Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMSD ![In: Business Modeling and Software Design - 13th International Symposium, BMSD 2023, Utrecht, The Netherlands, July 3-5, 2023, Proceedings, pp. 365-374, 2023, Springer, 978-3-031-36756-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shiwen Shen, Guo Z. Zhen, Liu T. Tianling, Bian C. Chenya, Ning Y. Yuqiao, Chen Y. Yang |
Research and Analysis of Vulnerabilities in Intelligent Connected Vehicle Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSIT ![In: 6th International Conference on Data Science and Information Technology, DSIT 2023, Shanghai, China, July 28-30, 2023, pp. 255-264, 2023, IEEE, 979-8-3503-0444-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Victor Bandur, Mark Lawford, Sébastien Mosser 0001, Richard F. Paige, Vera Pantelic, Alan Wassyng |
Using Assurance Cases to Prevent Malicious Behaviour from Targeting Safety Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP Workshops ![In: Computer Safety, Reliability, and Security. SAFECOMP 2023 Workshops - ASSURE, DECSoS, SASSUR, SENSEI, SRToITS, and WAISE, Toulouse, France, September 19, 2023, Proceedings, pp. 5-14, 2023, Springer, 978-3-031-40952-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rita Melo, Pedro Pinto 0001, António Pinto |
Severity Analysis of Web3 Security Vulnerabilities Based on Publicly Bug Reports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BLOCKCHAIN ![In: Blockchain and Applications, 5th International Congress, BLOCKCHAIN 2023, Guimaraes, Portugal, 12-14 July 2023., pp. 154-163, 2023, Springer, 978-3-031-45154-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mohamed Yanis Sadaoui, Osman Salem, Ahmed Mehaoua |
Security Assessment of Bluetooth Just Works Pairing Method: Vulnerabilities and Enhancements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HealthCom ![In: IEEE International Conference on E-health Networking, Application & Services, Healthcom 2023, Chongqing, China, December 15-17, 2023, pp. 107-112, 2023, IEEE, 979-8-3503-0230-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rydhampreet Singh Gindra, Kashish Goyal, Janvi Sethi, Chetna Kaushal |
Phishing and Web Hacking: Examining the Vulnerabilities and Defenses in the Digital Age. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 6th International Conference on Contemporary Computing and Informatics, IC3I 2023, Gautam Buddha Nagar, India, September 14-16, 2023, pp. 862-868, 2023, IEEE, 979-8-3503-0448-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Crystal Contreras, Hristina Dokic, Zhen Huang 0002, Daniela Stan Raicu, Jacob Furst 0001, Roselyne Tchoua |
Multiclass Classification of Software Vulnerabilities with Deep Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLC ![In: Proceedings of the 15th International Conference on Machine Learning and Computing, ICMLC 2023, Zhuhai, China, February 17-20, 2023, pp. 134-140, 2023, ACM, 978-1-4503-9841-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Arnaud Varillon, Laurent Sauvage, Jean-Luc Danger |
High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPACE ![In: Security, Privacy, and Applied Cryptography Engineering - 13th International Conference, SPACE 2023, Roorkee, India, December 14-17, 2023, Proceedings, pp. 139-161, 2023, Springer, 978-3-031-51582-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Matida Churu, Dewald Blaauw, Bruce W. Watson |
A Review and Analysis of Cybersecurity Threats and Vulnerabilities, by Development of a Fuzzy Rule-Based Expert System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PanAfriCon AI (2) ![In: Pan-African Conference on Artificial Intelligence - Second Conference, PanAfriCon AI 2023, Addis Ababa, Ethiopia, October 5-6, 2023, Revised Selected Papers, Part II, pp. 151-168, 2023, Springer, 978-3-031-57638-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Isabelle Heyl, Dewald Blaauw, Bruce W. Watson |
An Investigation and Analysis of Vulnerabilities Surrounding Cryptocurrencies and Blockchain Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PanAfriCon AI (2) ![In: Pan-African Conference on Artificial Intelligence - Second Conference, PanAfriCon AI 2023, Addis Ababa, Ethiopia, October 5-6, 2023, Revised Selected Papers, Part II, pp. 83-106, 2023, Springer, 978-3-031-57638-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Abdellatif Bakar, Abdelhamid Zouhair, El Mokhtar En-Naimi |
Review of Vulnerabilities and Countermeasures Against Sybil Attacks on Decentralized Systems Based on Machine Learning Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NISS ![In: Proceedings of the 6th International Conference on Networking, Intelligent Systems & Security, Larache, Morocco, May 24-26, 2023, pp. 29:1-29:5, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rashmi Sahay, Cherukuri Gaurav Sushant |
Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICTA (1) ![In: Evolution in Computational Intelligence - Proceedings of the 11th International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA 2023), Cardiff, UK, 11-12 April, 2023., pp. 665-675, 2023, Springer, 978-981-99-6701-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Artur Balsam, Michal Walkowski, Maciej Roman Nowak, Jacek Oko, Slawomir Sujecki |
Automated Calculation of CVSS v3.1 Temporal Score Based on Apache Log4j 2021 Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoftCOM ![In: International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2023, Split, Croatia, September 21-23, 2023, pp. 1-3, 2023, IEEE, 979-8-3503-0107-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Federico Carboni, Mauro Conti, Denis Donadel, Mariano Sciacco |
If You're Scanning This, It's Too Late! A QR Code-Based Fuzzing Methodology to Identify Input Vulnerabilities in Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings, pp. 553-570, 2023, Springer, 978-3-031-41180-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Salim Al Wahaibi, Myles Foley, Sergio Maffeis |
SQIRL: Grey-Box Detection of SQL Injection Vulnerabilities Using Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6097-6114, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Qinhong Jiang, Xiaoyu Ji 0001, Chen Yan 0001, Zhixin Xie, Haina Lou, Wenyuan Xu 0001 |
GlitchHiker: Uncovering Vulnerabilities of Image Signal Transmission with IEMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 7249-7266, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Yuanyuan Yuan, Zhibo Liu, Shuai Wang 0011 |
CacheQL: Quantifying and Localizing Cache Side-Channel Vulnerabilities in Production Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2009-2026, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Nicholas Boucher, Ross Anderson 0001 |
Trojan Source: Invisible Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6507-6524, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang 0014, Xiaohui Kuang, Gang Zhao |
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2689-2706, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
|
|