The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Santiago Cuéllar, Bill Harris, James Parker, Stuart Pernsteiner, Eran Tromer Cheesecloth: Zero-Knowledge Proofs of Real World Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Seunghoon Woo, Eunjin Choi, Heejo Lee, Hakjoo Oh V1SCAN: Discovering 1-day Vulnerabilities in Reused C/C++ Open-source Software Components Using Code Classification Techniques. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Zizhuang Deng, Guozhu Meng, Kai Chen 0012, Tong Liu, Lu Xiang, Chunyang Chen Differential Testing of Cross Deep Learning Framework APIs: Revealing Inconsistencies and Vulnerabilities. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Fabio Gritti, Nicola Ruaro, Robert McLaughlin, Priyanka Bose, Dipanjan Das 0002, Ilya Grishchenko, Christopher Kruegel, Giovanni Vigna Confusum Contractum: Confused Deputy Vulnerabilities in Ethereum Smart Contracts. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Sen Deng, Mengyuan Li, Yining Tang, Shuai Wang 0011, Shoumeng Yan, Yinqian Zhang CipherH: Automated Detection of Ciphertext Side-channel Vulnerabilities in Cryptographic Implementations. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Ruben Recabarren, Bogdan Carbunar, Nestor Hernandez, Ashfaq Ali Shafin Strategies and Vulnerabilities of Participants in Venezuelan Influence Operations. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Ming Yuan 0003, Bodong Zhao, Penghui Li 0001, Jiashuo Liang, Xinhui Han, Xiapu Luo, Chao Zhang 0008 DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Willy R. Vasquez, Stephen Checkoway, Hovav Shacham The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2023 DBLP  BibTeX  RDF
11Hugo Lefeuvre, Vlad-Andrei Badoiu, Yi Chen, Felipe Huici, Nathan Dautenhahn, Pierre Olivier Assessing the Impact of Interface Vulnerabilities in Compartmentalized Software. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Xiao Yi, Yuzhou Fang, Daoyuan Wu, Lingxiao Jiang BlockScope: Detecting and Investigating Propagated Vulnerabilities in Forked Blockchain Projects. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Christoph Sendner, Huili Chen, Hossein Fereidooni, Lukas Petzi, Jan König, Jasper Stang, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Farinaz Koushanfar Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Samuel Groß, Simon Koch, Lukas Bernhard, Thorsten Holz, Martin Johns FUZZILLI: Fuzzing for JavaScript JIT Compiler Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
11Erikson Júlio De Aguiar, Márcus V. L. Costa, Caetano Traina, Agma J. M. Traina Assessing Vulnerabilities of Deep Learning Explainability in Medical Image Analysis Under Adversarial Settings. Search on Bibsonomy CBMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Weicheng Li, Hui Lu 0005, Yanbin Sun, Shen Su, Jing Qiu 0002, Zhihong Tian Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis. Search on Bibsonomy IWQoS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Hongyan Liu 0001, Xiang Chen, Yi Shen 0012, Qun Huang 0001, Zhengyan Zhou, Dong Zhang, Chunming Wu 0001 Vulnerabilities and Attacks of Inter-device Coordination in Programmable Networks. Search on Bibsonomy IWQoS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Cristina Cismaru, Ruxandra Chiroiu Trandafir, Emil-Ioan Slusanschi A Study of GPU Memory Vulnerabilities. Search on Bibsonomy RoEduNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xiangfei Xu, Tianyuan Hu, Bixin Li, Li Liao CCDetector: Detect Chaincode Vulnerabilities Based on Knowledge Graph. Search on Bibsonomy COMPSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jianyi Zhang, Leixin Yang, Yuyang Han, Zixiao Xiang, Xiali Hei 0001 A Small Leak Will Sink Many Ships: Vulnerabilities Related to mini-programs Permissions. Search on Bibsonomy COMPSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xutan Peng, Yipeng Zhang, Jingfeng Yang, Mark Stevenson On the Vulnerabilities of Text-to-SQL Models. Search on Bibsonomy ISSRE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ivan Baheux, Oum-El-Kheir Aktouf, Mohammed El Amin Tebib, Mariem Graa, Pascal André, Yves Ledru DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities. Search on Bibsonomy ISSREW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11André Storhaug, Jingyue Li, Tianyuan Hu Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding. Search on Bibsonomy ISSRE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Leonid Dyachkov, Meni Orenbach, Mark Silberstein Fuzzing LibraryOSes for Iago vulnerabilities. Search on Bibsonomy SYSTOR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Martina Rossini, Mirko Zichichi, Stefano Ferretti On the Use of Deep Neural Networks for Security Vulnerabilities Detection in Smart Contracts. Search on Bibsonomy PerCom Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Shingo Okamura An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities. Search on Bibsonomy PerCom Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier 0001, Antonio Bianchi, Mathias Payer Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daniel Ricardo dos Santos Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It. Search on Bibsonomy SACMAT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yevheniya Nosyk, Olivier Hureau, Simon Fernandez, Andrzej Duda, Maciej Korczynski Unveiling the Weak Links: Exploring DNS Infrastructure Vulnerabilities and Fortifying Defenses. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Darion Cassel, Wai Tuck Wong, Limin Jia 0001 NodeMedic: End-to-End Analysis of Node.js Vulnerabilities with Provenance Graphs. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. Search on Bibsonomy EuroS&P The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zikun Liu, Changming Xu, Emerson Sie, Gagandeep Singh 0001, Deepak Vasisht Exploring Practical Vulnerabilities of Machine Learning-based Wireless Systems. Search on Bibsonomy NSDI The full citation details ... 2023 DBLP  BibTeX  RDF
11Xiang Tang, Houlin Zhou, Man Zhang, Yuheng Zhang, Guocheng Wu 0003, Hui Lu, Xiang Yu, Zhihong Tian Research on the Exploitability of Binary Software Vulnerabilities. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhuzhu Wang, Ying Wang NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling. Search on Bibsonomy CloudNet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rafael Diaz, Katherine Smith, Serena Bertagna, Vittorio Bucci Digital Transformation, Applications, and Vulnerabilities in Maritime and Shipbuilding Ecosystems. Search on Bibsonomy ISM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yung-Tai Cheng, Shin-Ming Cheng Firmulti Fuzzer: Discovering Multi-process Vulnerabilities in IoT Devices with Full System Emulation and VMI. Search on Bibsonomy CPSIOTSEC@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zhen Huang Targeted Symbolic Execution for UAF Vulnerabilities. Search on Bibsonomy ICSRS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tomohiko Yano, Hiroki Kuzuno Security Risk Visualization for Open-Source Software based on Vulnerabilities, Repositories, and Dependencies. Search on Bibsonomy candar The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Janaka Senanayake, Harsha K. Kalutarage, M. Omar Al-Kadri, Andrei Petrovski 0001, Luca Piras 0003 Android Code Vulnerabilities Early Detection Using AI-Powered ACVED Plugin. Search on Bibsonomy DBSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Rizwan Patan, Reza M. Parizi Automatic Detection of API Access Control Vulnerabilities in Decentralized Web3 Applications. Search on Bibsonomy DAPPS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Justin Tracey, Ian Goldberg Grading on a Curve: How Rust can Facilitate New Contributors while Decreasing Vulnerabilities. Search on Bibsonomy SecDev The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alexander Senier Tutorial: The End of Binary Protocol Parser Vulnerabilities : Using RecordFlux and SPARK to implement formally-verified binary formats and communication protocols. Search on Bibsonomy SecDev The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Felipe Moreno Vera Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums. Search on Bibsonomy ICTC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Arwa Abdulkarim Al Alsadi, Kaichi Sameshima, Katsunari Yoshioka, Michel van Eeten, Carlos Hernandez Gañán Bin there, target that: Analyzing the target selection of IoT vulnerabilities in malware binaries. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zeyu Chen, Daiping Liu, Jidong Xiao, Haining Wang All Use-After-Free Vulnerabilities Are Not Created Equal: An Empirical Study on Their Characteristics and Detectability. Search on Bibsonomy RAID The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Frank Lee, Gregory Falco The Vulnerabilities Less Exploited: Cyberattacks on End-of-Life Satellites. Search on Bibsonomy SpaceSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Daniel-Radu Vatavu Vulnerabilities of Mediated Embodiment: Towards Unmasking Security and Privacy Risks of Ability-Mediating Wearables. Search on Bibsonomy WAMWB@MobileHCI The full citation details ... 2023 DBLP  BibTeX  RDF
11Serly Moghadas, Claudio Fiandrino, Alan Collet, Giulia Attanasio, Marco Fiore, Joerg Widmer Spotting Deep Neural Network Vulnerabilities in Mobile Traffic Forecasting with an Explainable AI Lens. Search on Bibsonomy INFOCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jingda Yang, Ying Wang, Tuyen X. Tran, Yanjun Pan 5G RRC Protocol and Stack Vulnerabilities Detection via Listen-and-Learn. Search on Bibsonomy CCNC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Krzysztof Sadowski, Pawel Wolski, Ireneusz Czarnowski An application for collecting and mining reports referring vulnerabilities and exposures in physical systems: A comparative study of selected clustering methods. Search on Bibsonomy KES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Alessandro Marchetto 0001, Giuseppe Scanniello A Rapid Review on Software Vulnerabilities and Embedded, Cyber-Physical, and IoT Systems. Search on Bibsonomy PROFES (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Moritz Mock Utilization of Machine Learning for the Detection of Self-admitted Vulnerabilities. Search on Bibsonomy PROFES (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Maryna Kolisnyk, Oleksandr P. Piskachov Analysis and Systematization of Vulnerabilities of Drone Subsystems. Search on Bibsonomy ICTERI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Linus Hafkemeyer, Jerre Starink, Andrea Continella Divak: Non-invasive Characterization of Out-of-Bounds Write Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yunsen Lei, Julian P. Lanson, Craig A. Shue, Timothy W. Wood Attackers as Instructors: Using Container Isolation to Reduce Risk and Understand Vulnerabilities. Search on Bibsonomy DIMVA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Stefan Throner, Sebastian Abeck, Patrick Petrovic, Heiko Hütter A DevOps Approach to the Mitigation of Security Vulnerabilities in Runtime Environments. Search on Bibsonomy SOSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shampa Banik, Trapa Banik, S. M. Mostaq Hossain, Sohag Kumar Saha Implementing Man-in-the-Middle Attack to Investigate Network Vulnerabilities in Smart Grid Test-bed. Search on Bibsonomy AIIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yi Wu, Nan Jiang 0012, Hung Viet Pham, Thibaud Lutellier, Jordan Davis, Lin Tan 0001, Petr Babkin, Sameena Shah How Effective Are Neural Networks for Fixing Security Vulnerabilities. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zeqin Liao, Sicheng Hao 0001, Yuhong Nan, Zibin Zheng SmartState: Detecting State-Reverting Vulnerabilities in Smart Contracts via Fine-Grained State-Dependency Analysis. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Songtao Yang, Yubo He, Kaixiang Chen, Zheyu Ma, Xiapu Luo, Yong Xie, Jianjun Chen 0005, Chao Zhang 0008 1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kai Cheng, Yaowen Zheng, Tao Liu, Le Guan, Peng Liu 0005, Hong Li 0004, Hongsong Zhu, Kejiang Ye, Limin Sun Detecting Vulnerabilities in Linux-Based Embedded Firmware with SSE-Based On-Demand Alias Analysis. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Queping Kong, Jiachi Chen, Yanlin Wang 0001, Zigui Jiang, Zibin Zheng DeFiTainter: Detecting Price Manipulation Vulnerabilities in DeFi Protocols. Search on Bibsonomy ISSTA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Nikolas Tyllis, Faheem Ullah, Muhammad Uzair An Exploratory Study of Vulnerabilities in Big Data Systems. Search on Bibsonomy IEEE Big Data The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sabato Nocera, Simone Romano 0001, Rita Francese, Riccardo Burlon, Giuseppe Scanniello Managing Vulnerabilities in Software Projects: the Case of NTT Data. Search on Bibsonomy SEAA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Majd Soud, Ilham A. Qasse, Grischa Liebel, Mohammad Hamdaqa AutoMESC: Automatic Framework for Mining and Classifying Ethereum Smart Contract Vulnerabilities and Their Fixes. Search on Bibsonomy SEAA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Mohamad Mansouri, Jun Xu 0024, Georgios Portokalidis Eliminating Vulnerabilities by Disabling Unwanted Functionality in Binary Programs. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Pallavi Sivakumaran, Chaoshun Zuo, Zhiqiang Lin, Jorge Blasco Uncovering Vulnerabilities of Bluetooth Low Energy IoT from Companion Mobile Apps with Ble-Guuide. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Wenyuan Xu 0001 Rethinking IoT Security: Understanding and Mitigating Out-of-Band Vulnerabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kun Peng How Secure Are The Main Real-World Mix Networks - Case Studies To Explore Vulnerabilities And Usability. Search on Bibsonomy AsiaCCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Gerald Vailoces, Alexander Keith, Abdulaziz Almehmadi, Khalil El-Khatib Securing the Electric Vehicle Charging Infrastructure: An In-Depth Analysis of Vulnerabilities and Countermeasures. Search on Bibsonomy DIVANet The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Weimin Chen, Zihan Sun, Haoyu Wang 0001, Xiapu Luo, Haipeng Cai, Lei Wu 0012 Poster: Uncovering Vulnerabilities in Wasm Smart Contracts. Search on Bibsonomy ICDCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Seth Barrett, Bradley Boswell, Gokila Dorai Exploring the Vulnerabilities of IoT Devices: A Comprehensive Analysis of Mirai and Bashlite Attack Vectors. Search on Bibsonomy IOTSMS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Chi Jiang, Guojin Sun, Jinqing Shen, Binglei Yue, Yin Zhang 0002 Multi-label Detection Method for Smart Contract Vulnerabilities Based on Expert Knowledge and Pre-training Technology. Search on Bibsonomy ICA3PP (5) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Xinhui Lai, Maksim Jenihhin Analyzing Side-Channel Attack Vulnerabilities at RTL. Search on Bibsonomy LATS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Douglas J. Millward, Martin J. Reed, Nkaepe E. E. Olaniyi CACLE - Automated Mitigation for Misconfiguration Vulnerabilities in Cloud Systems. Search on Bibsonomy ICCBDC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan L. Boyd-Graber Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs Through a Global Prompt Hacking Competition. Search on Bibsonomy EMNLP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Sarthak Roy, Ashish Harshavardhan, Animesh Mukherjee 0001, Punyajoy Saha Probing LLMs for hate speech detection: strengths and vulnerabilities. Search on Bibsonomy EMNLP (Findings) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Grace LaMalva, Suzanna Schmeelk, Dristi Dinesh Python Cryptographic Secure Scripting Concerns: A Study of Three Vulnerabilities. Search on Bibsonomy FICC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11V. Turco, Annachiara Ruospo, Gabriele Gavarini, Ernesto Sánchez 0001, Matteo Sonza Reorda Uncovering hidden vulnerabilities in CNNs through evolutionary-based Image Test Libraries. Search on Bibsonomy DFT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Aoxiang Zhang, Yu Ran, Weixuan Tang, Yuan-Gen Wang Vulnerabilities in Video Quality Assessment Models: The Challenge of Adversarial Attacks. Search on Bibsonomy NeurIPS The full citation details ... 2023 DBLP  BibTeX  RDF
11Oey Kevin Andrian Santoso, Catherine Kwee, William Chua, Ghinaa Zain Nabiilah, Rojali Rust's Memory Safety Model: An Evaluation of Its Effectiveness in Preventing Common Vulnerabilities. Search on Bibsonomy ICCSCI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Qiang Chen, Fang Qian, Yukang Liu Dynamic Mining of Wireless Network Information Transmission Security Vulnerabilities Based on Spatiotemporal Dimension. Search on Bibsonomy ADHIP (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Tetiana A. Vakaliuk, Dmytro Talchenko, Viacheslav Osadchyi, Yelyzaveta Bailiuk, Oleksandra Pokotylo Vulnerabilities and Methods of Unauthorized Gaining Access to Video Surveillance Systems (short paper). Search on Bibsonomy CPITS The full citation details ... 2023 DBLP  BibTeX  RDF
11Chaozheng Wang, Zongjie Li, Yun Peng, Shuzheng Gao, Sirong Chen, Shuai Wang 0011, Cuiyun Gao, Michael R. Lyu REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jian Zhang, Shangqing Liu, Xu Wang 0007, Tianlin Li, Yang Liu 0003 Learning to Locate and Describe Vulnerabilities. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis 0001 Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lyuye Zhang, Chengwei Liu, Sen Chen 0001, Zhengzi Xu, Lingling Fan 0003, Lida Zhao, Yiran Zhang, Yang Liu 0003 Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem. Search on Bibsonomy ASE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yajun Teng, Wei Wang 0314, Jun Shao, Huiqing Wan, Heqing Huang, Yong Liu, Jingqiang Lin Curveball+: Exploring Curveball-Like Vulnerabilities of Implicit Certificate Validation. Search on Bibsonomy ESORICS (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Shaoyu Li, Shanghao Shi, Yang Xiao 0010, Chaoyu Zhang, Y. Thomas Hou 0001, Wenjing Lou Bijack: Breaking Bitcoin Network with TCP Vulnerabilities. Search on Bibsonomy ESORICS (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Anders Mølmen Høst, Pierre Lison, Leon Moonen Constructing a Knowledge Graph from Textual Descriptions of Software Vulnerabilities in the National Vulnerability Database. Search on Bibsonomy NoDaLiDa The full citation details ... 2023 DBLP  BibTeX  RDF
11Sicong Cao, Biao He, Xiaobing Sun 0001, Yu Ouyang, Chao Zhang 0008, Xiaoxue Wu, Ting Su 0001, Lili Bo, Bin Li 0006, Chuanlei Ma, Jiajia Li, Tao Wei ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zheyue Jiang, Yuan Zhang, Jun Xu, Xinqian Sun, Zhuang Liu, Min Yang 0002 AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Zheyue Jiang, Yuan Zhang 0009, Jun Xu 0024, Xinqian Sun, Zhuang Liu, Min Yang 0002 AEM: Facilitating Cross-Version Exploitability Assessment of Linux Kernel Vulnerabilities. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiawei Yin, Menghao Li, Yuekang Li, Yong Yu, Boru Lin, Yanyan Zou, Yang Liu, Wei Huo, Jingling Xue RSFuzzer: Discovering Deep SMI Handler Vulnerabilities in UEFI Firmware with Hybrid Fuzzing. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Erik Trickel, Fabio Pagani, Chang Zhu, Lukas Dresel, Giovanni Vigna, Christopher Kruegel, Ruoyu Wang 0001, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities. Search on Bibsonomy SP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Davide Corradini, Michele Pasqua, Mariano Ceccato Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIs. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiashuo Zhang, Yue Li 0037, Jianbo Gao, Zhi Guan, Zhong Chen 0001 Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts. Search on Bibsonomy ICSE Companion The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yulun Wu, Zeliang Yu, Ming Wen 0001, Qiang Li, Deqing Zou, Hai Jin 0001 Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen 0001, Lingling Fan 0003, Lida Zhao, Jiahui Wu, Yang Liu 0003 Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Asem Ghaleb, Julia Rubin, Karthik Pattabiraman AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities. Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license