|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer |
Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6525-6540, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh |
V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6541-6556, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Zizhuang Deng, Guozhu Meng, Kai Chen 0012, Tong Liu, Lu Xiang, Chunyang Chen |
Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 7393-7410, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das 0002, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna |
Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 1793-1810, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang 0011, Shoumeng Yan, Yinqian Zhang |
CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6843-6860, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin |
Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6683-6700, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Ming Yuan 0003, Bodong Zhao, Penghui Li 0001, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang 0008 |
DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 2849-2866, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6647-6664, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier |
Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang |
BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar |
Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns |
FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 30th Annual Network and Distributed System Security Symposium, NDSS 2023, San Diego, California, USA, February 27 - March 3, 2023, 2023, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Erikson Júlio De Aguiar, Márcus V. L. Costa, Caetano Traina, Agma J. M. Traina |
Assessing Vulnerabilities of Deep Learning Explainability in Medical Image Analysis Under Adversarial Settings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 36th IEEE International Symposium on Computer-Based Medical Systems, CBMS 2023, L'Aquila, Italy, June 22-24, 2023, pp. 13-16, 2023, IEEE, 979-8-3503-1224-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Weicheng Li, Hui Lu 0005, Yanbin Sun, Shen Su, Jing Qiu 0002, Zhihong Tian |
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023, Orlando, FL, USA, June 19-21, 2023, pp. 1-2, 2023, IEEE, 979-8-3503-9973-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Hongyan Liu 0001, Xiang Chen, Yi Shen 0012, Qun Huang 0001, Zhengyan Zhou, Dong Zhang, Chunming Wu 0001 |
Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 31st IEEE/ACM International Symposium on Quality of Service, IWQoS 2023, Orlando, FL, USA, June 19-21, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-9973-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Cristina Cismaru, Ruxandra Chiroiu Trandafir, Emil-Ioan Slusanschi |
A Study of GPU Memory Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoEduNet ![In: 22nd RoEduNet Conference: Networking in Education and Research, RoEduNet 2023, Craiova, Romania, September 21-22, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-9366-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao |
CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 699-704, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jianyi Zhang, Leixin Yang, Yuyang Han, Zixiao Xiang, Xiali Hei 0001 |
A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 595-606, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson |
On the Vulnerabilities of Text-to-SQL Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, Florence, Italy, October 9-12, 2023, pp. 1-12, 2023, IEEE, 979-8-3503-1594-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ivan Baheux, Oum-El-Kheir Aktouf, Mohammed El Amin Tebib, Mariem Graa, Pascal André, Yves Ledru |
DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSREW ![In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023 - Workshops, Florence, Italy, October 9-12, 2023, pp. 136-141, 2023, IEEE, 979-8-3503-1956-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | André Storhaug, Jingyue Li, Tianyuan Hu |
Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, Florence, Italy, October 9-12, 2023, pp. 683-693, 2023, IEEE, 979-8-3503-1594-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Leonid Dyachkov, Meni Orenbach, Mark Silberstein |
Fuzzing LibraryOSes for Iago vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYSTOR ![In: Proceedings of the 16th ACM International Conference on Systems and Storage, SYSTOR 2023, Haifa, Israel, June 5-7, 2023, pp. 151, 2023, ACM, 978-1-4503-9962-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Martina Rossini, Mirko Zichichi, Stefano Ferretti |
On the Use of Deep Neural Networks for Security Vulnerabilities Detection in Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta, GA, USA, March 13-17, 2023, pp. 74-79, 2023, IEEE, 978-1-6654-5381-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Shingo Okamura |
An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, PerCom Workshops 2023, Atlanta, GA, USA, March 13-17, 2023, pp. 92-97, 2023, IEEE, 978-1-6654-5381-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier 0001, Antonio Bianchi, Mathias Payer |
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2023, San Francisco, CA, USA, December 3-9, 2023, pp. 1586-1597, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Daniel Ricardo dos Santos |
Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pp. 5-6, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves |
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 489-505, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Andrzej Duda, Maciej Korczynski |
Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2023 - Workshops, Delft, Netherlands, July 3-7, 2023, pp. 546-557, 2023, IEEE, 979-8-3503-2720-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Darion Cassel, Wai Tuck Wong, Limin Jia 0001 |
NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 1101-1127, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer |
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: 8th IEEE European Symposium on Security and Privacy, EuroS&P 2023, Delft, Netherlands, July 3-7, 2023, pp. 687-706, 2023, IEEE, 978-1-6654-6512-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zikun Liu, Changming Xu, Emerson Sie, Gagandeep Singh 0001, Deepak Vasisht |
Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSDI ![In: 20th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2023, Boston, MA, April 17-19, 2023., pp. 1801-1817, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu 0003, Hui Lu, Xiang Yu, Zhihong Tian |
Research on the Exploitability of Binary Software Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudNet ![In: 12th IEEE International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023, pp. 403-407, 2023, IEEE, 979-8-3503-1306-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zhuzhu Wang, Ying Wang |
NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudNet ![In: 12th IEEE International Conference on Cloud Networking, CloudNet 2023, Hoboken, NJ, USA, November 1-3, 2023, pp. 194-202, 2023, IEEE, 979-8-3503-1306-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rafael Diaz, Katherine Smith, Serena Bertagna, Vittorio Bucci |
Digital Transformation, Applications, and Vulnerabilities in Maritime and Shipbuilding Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Proceedings of the 4th International Conference on Industry 4.0 and Smart Manufacturing (ISM 2023), Lisbon, Portugal, 22-24 November 2023., pp. 1396-1405, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yung-Tai Cheng, Shin-Ming Cheng |
Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPSIOTSEC@CCS ![In: Proceedings of the 5th Workshop on CPS&IoT Security and Privacy, Copenhagen, Denmark, 26 November 2023, pp. 1-9, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zhen Huang |
Targeted Symbolic Execution for UAF Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSRS ![In: 7th International Conference on System Reliability and Safety, ICSRS 2023, Bologna, Italy, November 22-24, 2023, pp. 282-289, 2023, IEEE, 979-8-3503-0605-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tomohiko Yano, Hiroki Kuzuno |
Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
candar ![In: Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28 - Dec. 1, 2023, pp. 210-216, 2023, IEEE, 979-8-3503-0670-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski 0001, Luca Piras 0003 |
Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings, pp. 339-357, 2023, Springer, 978-3-031-37585-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Rizwan Patan, Reza M. Parizi |
Automatic Detection of API Access Control Vulnerabilities in Decentralized Web3 Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAPPS ![In: IEEE International Conference on Decentralized Applications and Infrastructures, DAPPS 2023, Athens, Greece, July 17-20, 2023, pp. 76-85, 2023, IEEE, 979-8-3503-3535-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Justin Tracey, Ian Goldberg |
Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023, pp. 26-36, 2023, IEEE, 979-8-3503-3132-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alexander Senier |
Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development Conference, SecDev 2023, Atlanta, GA, USA, October 18-20, 2023, pp. 5-6, 2023, IEEE, 979-8-3503-3132-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Felipe Moreno Vera |
Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: 14th International Conference on Information and Communication Technology Convergence, ICTC 2023, Jeju Island, Korea, Republic of, October 11-13, 2023, pp. 816-821, 2023, IEEE, 979-8-3503-1327-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán |
Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023, pp. 513-526, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang |
All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023, pp. 623-638, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Frank Lee, Gregory Falco |
The Vulnerabilities Less Exploited: Cyberattacks on End-of-Life Satellites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpaceSec ![In: 1st Workshop on Security of Space and Satellite Systems, SpaceSec 2023, San Diego, California, USA, Feburary, 27, 2023., 2023, The Internet Society, 1-891562-89-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Daniel-Radu Vatavu |
Vulnerabilities of Mediated Embodiment: Towards Unmasking Security and Privacy Risks of Ability-Mediating Wearables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAMWB@MobileHCI ![In: Proceedings of the Workshop on Advances of Mobile and Wearable Biometrics (WAMWB 2023) co-located with ACM International Conference on Mobile Human-Computer Interaction 2023 (MobileHCI 2023) Athens, Greece, September 26, 2023., Athens, Greece, September 26, 2023., pp. 65-69, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Serly Moghadas, Claudio Fiandrino, Alan Collet, Giulia Attanasio, Marco Fiore, Joerg Widmer |
Spotting Deep Neural Network Vulnerabilities in Mobile Traffic Forecasting with an Explainable AI Lens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-3414-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jingda Yang, Ying Wang, Tuyen X. Tran, Yanjun Pan |
5G RRC Protocol and Stack Vulnerabilities Detection via Listen-and-Learn. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 20th IEEE Consumer Communications & Networking Conference, CCNC 2023, Las Vegas, NV, USA, January 8-11, 2023, pp. 236-241, 2023, IEEE, 978-1-6654-9734-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Krzysztof Sadowski, Pawel Wolski, Ireneusz Czarnowski |
An application for collecting and mining reports referring vulnerabilities and exposures in physical systems: A comparative study of selected clustering methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, Athens, Greece, 6-8 September 2023., pp. 2763-2772, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Alessandro Marchetto 0001, Giuseppe Scanniello |
A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES (1) ![In: Product-Focused Software Process Improvement - 24th International Conference, PROFES 2023, Dornbirn, Austria, December 10-13, 2023, Proceedings, Part I, pp. 468-477, 2023, Springer, 978-3-031-49265-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Moritz Mock |
Utilization of Machine Learning for the Detection of Self-admitted Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES (2) ![In: Product-Focused Software Process Improvement - 24th International Conference, PROFES 2023, Dornbirn, Austria, December 10-13, 2023, Proceedings, Part II, pp. 139-145, 2023, Springer, 978-3-031-49268-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Maryna Kolisnyk, Oleksandr P. Piskachov |
Analysis and Systematization of Vulnerabilities of Drone Subsystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTERI ![In: Information and Communication Technologies in Education, Research, and Industrial Applications - 18th International Conference, ICTERI 2023, Ivano-Frankivsk, Ukraine, September 18-22, 2023, Proceedings, pp. 65-81, 2023, Springer, 978-3-031-48324-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Linus Hafkemeyer, Jerre Starink, Andrea Continella |
Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings, pp. 211-232, 2023, Springer, 978-3-031-35503-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yunsen Lei, Julian P. Lanson, Craig A. Shue, Timothy W. Wood |
Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings, pp. 177-197, 2023, Springer, 978-3-031-35503-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Stefan Throner, Sebastian Abeck, Patrick Petrovic, Heiko Hütter |
A DevOps Approach to the Mitigation of Security Vulnerabilities in Runtime Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: IEEE International Conference on Service-Oriented System Engineering, SOSE 2023, Athens, Greece, July 17-20, 2023, pp. 106-113, 2023, IEEE, 979-8-3503-2239-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha |
Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIIoT ![In: 2023 IEEE World AI IoT Congress (AIIoT), Seattle, WA, USA, June 7-10, 2023, pp. 345-351, 2023, IEEE, 979-8-3503-3761-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yi Wu, Nan Jiang 0012, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan 0001, Petr Babkin, Sameena Shah |
How Effective Are Neural Networks for Fixing Security Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 1282-1294, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zeqin Liao, Sicheng Hao 0001, Yuhong Nan, Zibin Zheng |
SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 980-991, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen 0005, Chao Zhang 0008 |
1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 867-879, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu 0005, Hong Li 0004, Hongsong Zhu, Kejiang Ye, Limin Sun |
Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 360-372, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Queping Kong, Jiachi Chen, Yanlin Wang 0001, Zigui Jiang, Zibin Zheng |
DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2023, Seattle, WA, USA, July 17-21, 2023, pp. 1144-1156, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Nikolas Tyllis, Faheem Ullah, Muhammad Uzair |
An Exploratory Study of Vulnerabilities in Big Data Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023, pp. 1360-1367, 2023, IEEE, 979-8-3503-2445-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sabato Nocera, Simone Romano 0001, Rita Francese, Riccardo Burlon, Giuseppe Scanniello |
Managing Vulnerabilities in Software Projects: the Case of NTT Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAA ![In: 49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023, Durres, Albania, September 6-8, 2023, pp. 247-253, 2023, IEEE, 979-8-3503-4235-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Majd Soud, Ilham A. Qasse, Grischa Liebel, Mohammad Hamdaqa |
AutoMESC: Automatic Framework for Mining and Classifying Ethereum Smart Contract Vulnerabilities and Their Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEAA ![In: 49th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2023, Durres, Albania, September 6-8, 2023, pp. 410-417, 2023, IEEE, 979-8-3503-4235-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Mohamad Mansouri, Jun Xu 0024, Georgios Portokalidis |
Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 259-273, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco |
Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 1004-1015, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Wenyuan Xu 0001 |
Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 1, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kun Peng |
How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 539-551, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Gerald Vailoces, Alexander Keith, Abdulaziz Almehmadi, Khalil El-Khatib |
Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIVANet ![In: Proceedings of the Int'l ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, DIVANet 2023, Montreal, Quebec, Canada, 30 October 2023- 3 November 2023, pp. 31-38, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Weimin Chen, Zihan Sun, Haoyu Wang 0001, Xiapu Luo, Haipeng Cai, Lei Wu 0012 |
Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 43rd IEEE International Conference on Distributed Computing Systems, ICDCS 2023, Hong Kong, July 18-21, 2023, pp. 1073-1074, 2023, IEEE, 979-8-3503-3986-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Seth Barrett, Bradley Boswell, Gokila Dorai |
Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOTSMS ![In: 10th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2023, San Antonio, TX, USA, October 23-25, 2023, pp. 125-132, 2023, IEEE, 979-8-3503-9389-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Chi Jiang, Guojin Sun, Jinqing Shen, Binglei Yue, Yin Zhang 0002 |
Multi-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP (5) ![In: Algorithms and Architectures for Parallel Processing - 23rd International Conference, ICA3PP 2023, Tianjin, China, October 20-22, 2023, Proceedings, Part V, pp. 299-312, 2023, Springer, 978-981-97-0807-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Xinhui Lai, Maksim Jenihhin |
Analyzing Side-Channel Attack Vulnerabilities at RTL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATS ![In: 24th IEEE Latin American Test Symposium, LATS 2023, Veracruz, Mexico, March 21-24, 2023, pp. 1-2, 2023, IEEE, 979-8-3503-2597-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Douglas J. Millward, Martin J. Reed, Nkaepe E. E. Olaniyi |
CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCBDC ![In: Proceedings of the 7th International Conference on Cloud and Big Data Computing, ICCBDC 2023, Manchester, United Kingdom, August 17-19, 2023, pp. 74-80, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan L. Boyd-Graber |
Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs Through a Global Prompt Hacking Competition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP ![In: Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, EMNLP 2023, Singapore, December 6-10, 2023, pp. 4945-4977, 2023, Association for Computational Linguistics, 979-8-89176-060-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Sarthak Roy, Ashish Harshavardhan, Animesh Mukherjee 0001, Punyajoy Saha |
Probing LLMs for hate speech detection: strengths and vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (Findings) ![In: Findings of the Association for Computational Linguistics: EMNLP 2023, Singapore, December 6-10, 2023., pp. 6116-6128, 2023, Association for Computational Linguistics, 979-8-89176-061-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Grace LaMalva, Suzanna Schmeelk, Dristi Dinesh |
Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FICC (2) ![In: Advances in Information and Communication - Proceedings of the 2023 Future of Information and Communication Conference (FICC), Volume 2, San Francisco, CA, USA, 2-3 March 2023., pp. 602-613, 2023, Springer, 978-3-031-28072-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | V. Turco, Annachiara Ruospo, Gabriele Gavarini, Ernesto Sánchez 0001, Matteo Sonza Reorda |
Uncovering hidden vulnerabilities in CNNs through evolutionary-based Image Test Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, DFT 2023, Juan-Les-Pins, France, October 3-5, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1500-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Aoxiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang |
Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023., 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Oey Kevin Andrian Santoso, Catherine Kwee, William Chua, Ghinaa Zain Nabiilah, Rojali |
Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSCI ![In: Empowering Smart Technology in Digital Era for Industry and Socity: The 8th International Conference on Computer Science and Computational Intelligence, ICCSCI 2023, 02-03 August 2023, Malang, Indonesia., pp. 119-127, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Chen, Fang Qian, Yukang Liu |
Dynamic Mining of Wireless Network Information Transmission Security Vulnerabilities Based on Spatiotemporal Dimension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADHIP (2) ![In: Advanced Hybrid Information Processing - 7th EAI International Conference, ADHIP 2023, Harbin, China, September 22-24, 2023, Proceedings, Part II, pp. 403-417, 2023, Springer, 978-3-031-50545-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Tetiana A. Vakaliuk, Dmytro Talchenko, Viacheslav Osadchyi, Yelyzaveta Bailiuk, Oleksandra Pokotylo |
Vulnerabilities and Methods of Unauthorized Gaining Access to Video Surveillance Systems (short paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS ![In: Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, CPITS 2023, co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), Kyiv, Ukraine, February 28, 2023 (online)., pp. 174-181, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang 0011, Cuiyun Gao, Michael R. Lyu |
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023, pp. 1952-1962, 2023, IEEE, 979-8-3503-2996-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jian Zhang, Shangqing Liu, Xu Wang 0007, Tianlin Li, Yang Liu 0003 |
Learning to Locate and Describe Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023, pp. 332-344, 2023, IEEE, 979-8-3503-2996-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang |
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023, pp. 1664-1675, 2023, IEEE, 979-8-3503-2996-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis 0001 |
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023, pp. 926-938, 2023, IEEE, 979-8-3503-2996-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyuye Zhang, Chengwei Liu, Sen Chen 0001, Zhengzi Xu, Lingling Fan 0003, Lida Zhao, Yiran Zhang, Yang Liu 0003 |
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, Luxembourg, September 11-15, 2023, pp. 191-203, 2023, IEEE, 979-8-3503-2996-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yajun Teng, Wei Wang 0314, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin |
Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (2) ![In: Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II, pp. 212-234, 2023, Springer, 978-3-031-51475-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Shaoyu Li, Shanghao Shi, Yang Xiao 0010, Chaoyu Zhang, Y. Thomas Hou 0001, Wenjing Lou |
Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (3) ![In: Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III, pp. 306-326, 2023, Springer, 978-3-031-51478-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Anders Mølmen Høst, Pierre Lison, Leon Moonen |
Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NoDaLiDa ![In: Proceedings of the 24th Nordic Conference on Computational Linguistics, NoDaLiDa 2023, Tórshavn, Faroe Islands, May 22-24, 2023, pp. 386-391, 2023, University of Tartu Library, 978-99-1621-999-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
11 | Sicong Cao, Biao He, Xiaobing Sun 0001, Yu Ouyang, Chao Zhang 0008, Xiaoxue Wu, Ting Su 0001, Lili Bo, Bin Li 0006, Chuanlei Ma, Jiajia Li, Tao Wei |
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2726-2743, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang 0002 |
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2122-2137, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Zheyue Jiang, Yuan Zhang 0009, Jun Xu 0024, Xinqian Sun, Zhuang Liu, Min Yang 0002 |
AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2122-2137, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiawei Yin, Menghao Li, Yuekang Li, Yong Yu, Boru Lin, Yanyan Zou, Yang Liu, Wei Huo, Jingling Xue |
RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2155-2169, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé |
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2658-2675, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Davide Corradini, Michele Pasqua, Mariano Ceccato |
Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 2553-2564, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiashuo Zhang, Yue Li 0037, Jianbo Gao, Zhi Guan, Zhong Chen 0001 |
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, Melbourne, Australia, May 14-20, 2023, pp. 31-35, 2023, IEEE, 979-8-3503-2263-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yulun Wu, Zeliang Yu, Ming Wen 0001, Qiang Li, Deqing Zou, Hai Jin 0001 |
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 1046-1058, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen 0001, Lingling Fan 0003, Lida Zhao, Jiahui Wu, Yang Liu 0003 |
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 2540-2552, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Asem Ghaleb, Julia Rubin, Karthik Pattabiraman |
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 45th IEEE/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14-20, 2023, pp. 945-956, 2023, IEEE, 978-1-6654-5701-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
|
|