Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
Hardware assisted control flow obfuscation for embedded processors
MiBench: A free, commercially representative embedded benchmark suite
Deterministic and stochastic optimal inventory control with logistic stock-dependent demand rate
eng_Latn
4,600
An improvement to the SIFT descriptor for image representation and matching
Object retrieval with large vocabularies and fast spatial matching
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
eng_Latn
4,601
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
Deobfuscation: reverse engineering obfuscated code
SUBGRAPH TRANSFORMATIONS FOR THE INEXACT MATCHING OF ATTRIBUTED RELATIONALGRAPHS
eng_Latn
4,602
CODOMs: protecting software with code-centric memory domains
QEMU, a Fast and Portable Dynamic Translator
MINIX 3: a highly reliable, self-repairing operating system
eng_Latn
4,603
Attack-Resilient State Estimation for Noisy Dynamical Systems
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Malware Analysis using Multiple API Sequence Mining Control Flow Graph
kor_Hang
4,604
On-demand transparency for improving hardware Trojan detectability
Trojan Detection using IC Fingerprinting
An Evidence-Based Framework for Strengthening Exercises to Prevent Hamstring Injury
eng_Latn
4,605
Automated detection of logical errors in programs
Towards automatic generation of vulnerability-based signatures
Generating Big Data repositories for research in medical imaging
eng_Latn
4,606
ABASH: finding bugs in bash scripts
The essence of command injection attacks in web applications
A novel 2.5bit SHA-less MDAC design for 10bit 100Ms pipeline ADC
eng_Latn
4,607
Latent-Space Variational Bayes
Variational message passing
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
kor_Hang
4,608
Intelligent code reviews using deep learning
Tricorder: building a program analysis ecosystem
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
eng_Latn
4,609
BAP: A Binary Analysis Platform
A decision procedure for bit-vectors and arrays
Types and Programming Languages
kor_Hang
4,610
Detecting unknown malicious code by applying classification techniques on OpCode patterns
Malware phylogeny generation using permutations of code
Inferencing in information extraction: Techniques and applications
eng_Latn
4,611
Characterizing observability and controllability of software components
Abstract data types and software validation
CLEF 15 th Birthday : Past , Present , and Future
eng_Latn
4,612
Exploring Multiple Execution Paths for Malware Analysis
Detecting kernel-level rootkits through binary analysis
Computer virus-antivirus coevolution
eng_Latn
4,613
Stackguard: Simple stack smash protection for GCC
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
kor_Hang
4,614
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis
Guilt by association: large scale malware detection by mining file-relation graphs
Static Analysis of Executables to Detect Malicious Patterns
eng_Latn
4,615
Malware detection using assembly and API call sequences
A Taxonomy of Obfuscating Transformations
Survey on distance metric learning and dimensionality reduction in data mining
eng_Latn
4,616
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM
control - flow integrity .
Runtime countermeasures for code injection attacks against C and C++ programs
eng_Latn
4,617
dejavu : a map of code duplicates on github .
A Survey on Software Clone Detection Research
MapReduce: simplified data processing on large clusters
eng_Latn
4,618
Unleashing Mayhem on Binary Code
AEG: Automatic Exploit Generation
Dytan: a generic dynamic taint analysis framework
eng_Latn
4,619
Reverse Engineering PL/SQL Legacy Code: An Experience Report
reverse engineering and design recovery : a taxonomy .
Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals
kor_Hang
4,620
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
Structural detection of android malware using embedded call graphs
The MayaArch3D project: A 3D WebGIS for analyzing ancient architecture and landscapes
eng_Latn
4,621
CANDID: preventing sql injection attacks using dynamic candidate evaluations
SQLrand: Preventing SQL Injection Attacks
Color Barcode Decoding in the Presence of Specular Reflection
eng_Latn
4,622
Towards Effective Log Summarization
a classification of sql - injection attacks and countermeasures .
A branch and bound algorithm for extracting smallest minimal unsatisfiable subformulas
eng_Latn
4,623
AURA: a programming language for authorization and audit
Interactive programs in dependent type theory
F.Live: Towards interactive live broadcast FTV experience
eng_Latn
4,624
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
QuickFuzz: an automatic random fuzzer for common file formats
Coarse to fine K nearest neighbor classifier
eng_Latn
4,625
led - it - go : leaking ( a lot of ) data from air - gapped computers via the ( small ) hard drive led .
Exfiltration of information from air-gapped machines using monitor's LED indicator
ab initio algorithmic causal deconvolution of intertwined programs and networks by generative mechanism .
eng_Latn
4,626
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
eng_Latn
4,627
Cooperation and security isolation of library OSes for multi-process applications
Leveraging Legacy Code to Deploy Desktop Applications on the Web
motivation parameters for engineering managers using maslow ’ s theory .
eng_Latn
4,628
SimaticScan: towards a specialised vulnerability scanner for industrial control systems
AspFuzz: A state-aware protocol fuzzer based on application-layer protocols
Investigating Enactive Learning for Autonomous Intelligent Agents
eng_Latn
4,629
Improving Loop Dependence Analysis
Pin: building customized program analysis tools with dynamic instrumentation
Dynamic Instrumentation of Production Systems
eng_Latn
4,630
Address Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
Control-flow integrity principles, implementations, and applications
eng_Latn
4,631
Behavior based software theft detection
Valgrind: a framework for heavyweight dynamic binary instrumentation
Automatic logging of operating system effects to guide application-level architecture simulation
eng_Latn
4,632
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
A similarity metric method of obfuscated malware using function-call graph
VabCut: A video extension of GrabCut for unsupervised video foreground object segmentation
eng_Latn
4,633
Do Hardware Cache Flushing Operations Actually Meet Our Expectations?
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
Phonotactic language recognition using i-vectors and phoneme posteriogram counts
eng_Latn
4,634
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
A Generic Approach to Automatic Deobfuscation of Executable Code
AEG: Automatic Exploit Generation
eng_Latn
4,635
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code
Review of recent developments in OR/MS research in disaster operations management
eng_Latn
4,636
Precise Version Control of Trees with Line-Based Version Control Systems
Fine-grained and accurate source code differencing
Geometric Network Comparisons
eng_Latn
4,637
ViewDroid: towards obfuscation-resilient mobile application repackaging detection
A first step towards algorithm plagiarism detection
Imaging of the pediatric airway.
eng_Latn
4,638
hal - the missing piece of the puzzle for hardware reverse engineering , trojan detection and insertion .
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
The Artificial Sweetener Splenda Promotes Gut Proteobacteria, Dysbiosis, and Myeloperoxidase Reactivity in Crohn’s Disease–Like Ileitis
eng_Latn
4,639
Cohesion and reuse in an object-oriented system
Measuring functional cohesion
Practical Strategies for Power-Efficient Computing Technologies
eng_Latn
4,640
Learning API usages from bytecode: a statistical approach
Mining idioms from source code
Multiscale Centerline Detection by Learning a Scale-Space Distance Transform
eng_Latn
4,641
Interlocking obfuscation for anti-tamper hardware
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
Effects of red pepper on appetite and energy intake
eng_Latn
4,642
Automated Whitebox Fuzz Testing
Analyzing Memory Accesses in x86 Executables
CLOUD DATA PATTERNS FOR CONFIDENTIALITY
eng_Latn
4,643
Protecting C++ Dynamic Dispatch Through VTable Interleaving
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
Continuous - Time Active Filter Design Using Signal - Flow Graphs
eng_Latn
4,644
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection
Predicting Vulnerable Software Components via Text Mining
24.7% Record Efficiency HIT Solar Cell on Thin Silicon Wafer
eng_Latn
4,645
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
An Exploration of the Personal Software Process ( PSP )
eng_Latn
4,646
LAVA: Large-Scale Automated Vulnerability Addition
S2E: a platform for in-vivo multi-path analysis of software systems
QEMU, a Fast and Portable Dynamic Translator
yue_Hant
4,647
Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping
Malware Analysis and Classification: A Survey
Evaluation of multiple features for violent scenes detection
eng_Latn
4,648
Clone region descriptors: Representing and tracking duplication in source code
An empirical study of code clone genealogies
Damaged plasticity modelling of concrete in finite element analysis of reinforced concrete slabs
eng_Latn
4,649
A Systematic Mapping Study on Software Reuse
How reuse influences productivity in object-oriented systems
A Taxonomy of Attacks on the DNP3 Protocol
kor_Hang
4,650
vTPM: Virtualizing the trusted platform module
Live migration of virtual machines
Improving DPLL Solver Performance with Domain-Specific Heuristics: the ASP Case
eng_Latn
4,651
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
Clone detection using abstract syntax trees
Schwannoma of the Nasal Tip: Diagnosis and Treatment
eng_Latn
4,652
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard
Evaluating the Effectiveness of Current Anti-ROP Defenses
Calibrating On-Wafer Probes to the Probe Tips
eng_Latn
4,653
Malware Classification Using Image Representation
Toward Automated Dynamic Malware Analysis Using CWSandbox
history of morgellons disease : from delusion to definition .
eng_Latn
4,654
Classification of hardware trojan detection techniques
RapidSmith: Do-It-Yourself CAD Tools for Xilinx FPGAs
Multiband excitation vocoder
eng_Latn
4,655
Code Pointer Masking: Hardening Applications against Code Injection Attacks
Low-level software security: Attacks and defenses
Tiled-MapReduce: optimizing resource usages of data-parallel applications on multicore with tiling
eng_Latn
4,656
ROP is still dangerous: breaking modern defenses
control - flow integrity .
Open-Source Syringe Pump Library
eng_Latn
4,657
SigMal: a static signal processing based malware triage
Data mining methods for detection of new malicious executables
A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
eng_Latn
4,658
Investigating Dependencies in Software Requirements for Change Propagation Analysis
Recovering traceability links between code and documentation
Total Synthesis of (+)-Virgatusin via AlCl3-Catalyzed [3 + 2] Cycloaddition.
eng_Latn
4,659
Derive: a tool that automatically reverse-engineers instruction encodings
C and tcc: a language and compiler for dynamic code generation
Lethargus is a Caenorhabditis elegans sleep-like state
eng_Latn
4,660
attribute - driven community search .
A fast algorithm for Steiner trees
Image visualization based malware detection
eng_Latn
4,661
Comprehensive formal verification of an OS microkernel
All Your IFCException Are Belong to Us
Geometry of Compositionality
eng_Latn
4,662
Web application attack detection and forensics: A survey
Forensic-by-Design Framework for Cyber-Physical Cloud Systems
Signature hiding techniques for FPGA intellectual property protection
eng_Latn
4,663
Using Data Analytics to Detect Anomalous States in Vehicles
A Mobile Knowledge-based System for On-Board Diagnostics and Car Driving Assistance
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
eng_Latn
4,664
PEBIL: Efficient static binary instrumentation for Linux
Pin: building customized program analysis tools with dynamic instrumentation
The Treatment of Internet Gaming Disorder: a Brief Overview of the PIPATIC Program
eng_Latn
4,665
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
Static detection of cross-site scripting vulnerabilities
Modeling and implementing collaborative editing systems with transactional techniques
eng_Latn
4,666
GoldMine: Automatic assertion generation using data mining and static analysis
Rigel: an architecture and scalable programming interface for a 1000-core accelerator
Keyword advertising is not what you think: Clicking and eye movement behaviors on keyword advertising
eng_Latn
4,667
Hardware Trojans: Lessons Learned after One Decade of Research
Trojan Detection using IC Fingerprinting
Nonsuperconducting Fault Current Limiter With Controlling the Magnitudes of Fault Currents
eng_Latn
4,668
Opcode sequences as representation of executables for data-mining-based unknown malware detection
Principal Component Analysis
IoT-based fall detection system with energy efficient sensor nodes
eng_Latn
4,669
A study of the uniqueness of source code
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
Spatial ability and STEM: A sleeping giant for talent identification and development
eng_Latn
4,670
Are hardware performance counters a cost effective way for integrity checking of programs
Distilling free-form natural laws from experimental data
Three Is a Crowd - New Insights into Rosetting in Plasmodium falciparum.
eng_Latn
4,671
DRIP: A framework for purifying trojaned kernel drivers
QEMU, a Fast and Portable Dynamic Translator
DART: directed automated random testing
eng_Latn
4,672
2-2017 Lightweight data race detection for production runs
Pin: building customized program analysis tools with dynamic instrumentation
A High-Reliability, Low-Power Magnetic Full Adder
eng_Latn
4,673
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
Reverse engineering of binary device drivers with RevNIC
eng_Latn
4,674
The static analysis of WannaCry ransomware
Dridex: Analysis of the traffic and automatic generation of IOCs
Outcomes of Polydioxanone Knotless Thread Lifting for Facial Rejuvenation
eng_Latn
4,675
Overcoming the obfuscation of Java programs by identifier renaming
Manufacturing cheap, resilient, and stealthy opaque constructs
Crowdsourcing, collaboration and creativity
eng_Latn
4,676
whyper : towards automating risk assessment of mobile applications .
A survey of mobile malware in the wild
Low power and low voltage VT extractor circuit and MOSFET radiation dosimeter
eng_Latn
4,677
Finding dispatcher gadgets for jump oriented programming code reuse attacks
ROPdefender: a detection tool to defend against return-oriented programming attacks
Xsens MVN: Full 6DOF Human Motion Tracking Using Miniature Inertial Sensors
eng_Latn
4,678
Towards a better collaboration of static and dynamic analyses for testing concurrent programs
Conditional must not aliasing for static race detection
Fast YOLO: A Fast You Only Look Once System for Real-time Embedded Object Detection in Video
eng_Latn
4,679
Code compression for embedded VLIW processors using variable-to-fixed coding
Compiler techniques for code compaction
Privacy Tipping Points in Smartphones Privacy Preferences
eng_Latn
4,680
Bug isolation via remote program sampling
Collaborative filtering with privacy
Implementing the Belief Propagation Algorithm in MATLAB
eng_Latn
4,681
ROPdefender: a detection tool to defend against return-oriented programming attacks
dynamic binary analysis and instrumentation .
Tongue-in-Groove Setback of the Medial Crura to Control Nasal Tip Deprojection in Open Rhinoplasty
eng_Latn
4,682
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
Dermatoscopy for Melanoma and Pigmented Lesions
eng_Latn
4,683
Auto-grading for parallel programs
Habanero-Java library: a Java 8 framework for multicore programming
Clone detection using abstract syntax trees
eng_Latn
4,684
Model-based whitebox fuzzing for program binaries
Pin: building customized program analysis tools with dynamic instrumentation
Direct Intrinsics: Learning Albedo-Shading Decomposition by Convolutional Regression
eng_Latn
4,685
Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented Software
A METRICS SUITE FOR OBJECT ORIENTED DESIGN
Illuminant Aware Gamut-Based Color Transfer
eng_Latn
4,686
A behavior based malware detection scheme for avoiding false positive
A Layered Architecture for Detecting Malicious Behaviors
Stress and Memory: Behavioral Effects and Neurobiological Mechanisms
eng_Latn
4,687
de - obfuscation and detection of malicious pdf files with high accuracy .
Combining static and dynamic analysis for the detection of malicious documents
Insertion Transformer: Flexible Sequence Generation via Insertion Operations
eng_Latn
4,688
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
Obfuscation of executable code to improve resistance to static disassembly
Automated Decision Support for Financial Regulatory/Policy Compliance, using Textual Rulelog
eng_Latn
4,689
Software persistent memory
CIL: Intermediate language and tools for analysis and transformation of C programs
Data Fusion
eng_Latn
4,690
Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space
Out of Control: Overcoming Control-Flow Integrity
VTint: Protecting Virtual Function Tables' Integrity
eng_Latn
4,691
Rozzle: De-cloaking Internet Malware
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
Valgrind: a framework for heavyweight dynamic binary instrumentation
eng_Latn
4,692
Cryptographically Enforced Control Flow Integrity
Enforcing forward-edge control-flow integrity in GCC & LLVM
chapter 9 watching you watch movies : using eye tracking to inform cognitive film theory .
eng_Latn
4,693
( DEPSCOR FY 09 ) Obfuscation and Deobfuscation of Intent of Computer Programs
Context-sensitive analysis without calling-context
Factors affecting wound healing.
eng_Latn
4,694
Model-based whitebox fuzzing for program binaries
Pin: building customized program analysis tools with dynamic instrumentation
Towards Real-Time Object Detection on Embedded Systems
eng_Latn
4,695
Explanations for Regular Expressions
Automatic Network Protocol Analysis
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
eng_Latn
4,696
An adaptive FEC algorithm using hidden Markov chains
Adaptive FEC-based error control for Internet telephony
BareBox: efficient malware analysis on bare-metal
kor_Hang
4,697
Dridex: Analysis of the traffic and automatic generation of IOCs
Measuring and Detecting Fast-Flux Service Networks
Scalable, Behavior-Based Malware Clustering
eng_Latn
4,698
Windows API based Malware Detection and Framework Analysis
Eureka: A Framework for Enabling Static Malware Analysis
Multidimensional Bin Packing and Other Related Problems : A Survey ∗
eng_Latn
4,699