Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
Hardware assisted control flow obfuscation for embedded processors
|
MiBench: A free, commercially representative embedded benchmark suite
|
Deterministic and stochastic optimal inventory control with logistic stock-dependent demand rate
|
eng_Latn
| 4,600 |
An improvement to the SIFT descriptor for image representation and matching
|
Object retrieval with large vocabularies and fast spatial matching
|
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
|
eng_Latn
| 4,601 |
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
|
Deobfuscation: reverse engineering obfuscated code
|
SUBGRAPH TRANSFORMATIONS FOR THE INEXACT MATCHING OF ATTRIBUTED RELATIONALGRAPHS
|
eng_Latn
| 4,602 |
CODOMs: protecting software with code-centric memory domains
|
QEMU, a Fast and Portable Dynamic Translator
|
MINIX 3: a highly reliable, self-repairing operating system
|
eng_Latn
| 4,603 |
Attack-Resilient State Estimation for Noisy Dynamical Systems
|
Comprehensive Experimental Analyses of Automotive Attack Surfaces
|
Malware Analysis using Multiple API Sequence Mining Control Flow Graph
|
kor_Hang
| 4,604 |
On-demand transparency for improving hardware Trojan detectability
|
Trojan Detection using IC Fingerprinting
|
An Evidence-Based Framework for Strengthening Exercises to Prevent Hamstring Injury
|
eng_Latn
| 4,605 |
Automated detection of logical errors in programs
|
Towards automatic generation of vulnerability-based signatures
|
Generating Big Data repositories for research in medical imaging
|
eng_Latn
| 4,606 |
ABASH: finding bugs in bash scripts
|
The essence of command injection attacks in web applications
|
A novel 2.5bit SHA-less MDAC design for 10bit 100Ms pipeline ADC
|
eng_Latn
| 4,607 |
Latent-Space Variational Bayes
|
Variational message passing
|
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
|
kor_Hang
| 4,608 |
Intelligent code reviews using deep learning
|
Tricorder: building a program analysis ecosystem
|
A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention
|
eng_Latn
| 4,609 |
BAP: A Binary Analysis Platform
|
A decision procedure for bit-vectors and arrays
|
Types and Programming Languages
|
kor_Hang
| 4,610 |
Detecting unknown malicious code by applying classification techniques on OpCode patterns
|
Malware phylogeny generation using permutations of code
|
Inferencing in information extraction: Techniques and applications
|
eng_Latn
| 4,611 |
Characterizing observability and controllability of software components
|
Abstract data types and software validation
|
CLEF 15 th Birthday : Past , Present , and Future
|
eng_Latn
| 4,612 |
Exploring Multiple Execution Paths for Malware Analysis
|
Detecting kernel-level rootkits through binary analysis
|
Computer virus-antivirus coevolution
|
eng_Latn
| 4,613 |
Stackguard: Simple stack smash protection for GCC
|
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
|
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
|
kor_Hang
| 4,614 |
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis
|
Guilt by association: large scale malware detection by mining file-relation graphs
|
Static Analysis of Executables to Detect Malicious Patterns
|
eng_Latn
| 4,615 |
Malware detection using assembly and API call sequences
|
A Taxonomy of Obfuscating Transformations
|
Survey on distance metric learning and dimensionality reduction in data mining
|
eng_Latn
| 4,616 |
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM
|
control - flow integrity .
|
Runtime countermeasures for code injection attacks against C and C++ programs
|
eng_Latn
| 4,617 |
dejavu : a map of code duplicates on github .
|
A Survey on Software Clone Detection Research
|
MapReduce: simplified data processing on large clusters
|
eng_Latn
| 4,618 |
Unleashing Mayhem on Binary Code
|
AEG: Automatic Exploit Generation
|
Dytan: a generic dynamic taint analysis framework
|
eng_Latn
| 4,619 |
Reverse Engineering PL/SQL Legacy Code: An Experience Report
|
reverse engineering and design recovery : a taxonomy .
|
Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals
|
kor_Hang
| 4,620 |
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels
|
Structural detection of android malware using embedded call graphs
|
The MayaArch3D project: A 3D WebGIS for analyzing ancient architecture and landscapes
|
eng_Latn
| 4,621 |
CANDID: preventing sql injection attacks using dynamic candidate evaluations
|
SQLrand: Preventing SQL Injection Attacks
|
Color Barcode Decoding in the Presence of Specular Reflection
|
eng_Latn
| 4,622 |
Towards Effective Log Summarization
|
a classification of sql - injection attacks and countermeasures .
|
A branch and bound algorithm for extracting smallest minimal unsatisfiable subformulas
|
eng_Latn
| 4,623 |
AURA: a programming language for authorization and audit
|
Interactive programs in dependent type theory
|
F.Live: Towards interactive live broadcast FTV experience
|
eng_Latn
| 4,624 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers
|
QuickFuzz: an automatic random fuzzer for common file formats
|
Coarse to fine K nearest neighbor classifier
|
eng_Latn
| 4,625 |
led - it - go : leaking ( a lot of ) data from air - gapped computers via the ( small ) hard drive led .
|
Exfiltration of information from air-gapped machines using monitor's LED indicator
|
ab initio algorithmic causal deconvolution of intertwined programs and networks by generative mechanism .
|
eng_Latn
| 4,626 |
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation
|
Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware.
|
Driller: Augmenting Fuzzing Through Selective Symbolic Execution
|
eng_Latn
| 4,627 |
Cooperation and security isolation of library OSes for multi-process applications
|
Leveraging Legacy Code to Deploy Desktop Applications on the Web
|
motivation parameters for engineering managers using maslow ’ s theory .
|
eng_Latn
| 4,628 |
SimaticScan: towards a specialised vulnerability scanner for industrial control systems
|
AspFuzz: A state-aware protocol fuzzer based on application-layer protocols
|
Investigating Enactive Learning for Autonomous Intelligent Agents
|
eng_Latn
| 4,629 |
Improving Loop Dependence Analysis
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Dynamic Instrumentation of Production Systems
|
eng_Latn
| 4,630 |
Address Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity
|
Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads
|
Control-flow integrity principles, implementations, and applications
|
eng_Latn
| 4,631 |
Behavior based software theft detection
|
Valgrind: a framework for heavyweight dynamic binary instrumentation
|
Automatic logging of operating system effects to guide application-level architecture simulation
|
eng_Latn
| 4,632 |
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey
|
A similarity metric method of obfuscated malware using function-call graph
|
VabCut: A video extension of GrabCut for unsupervised video foreground object segmentation
|
eng_Latn
| 4,633 |
Do Hardware Cache Flushing Operations Actually Meet Our Expectations?
|
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
|
Phonotactic language recognition using i-vectors and phoneme posteriogram counts
|
eng_Latn
| 4,634 |
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
|
A Generic Approach to Automatic Deobfuscation of Executable Code
|
AEG: Automatic Exploit Generation
|
eng_Latn
| 4,635 |
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs.
|
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code
|
Review of recent developments in OR/MS research in disaster operations management
|
eng_Latn
| 4,636 |
Precise Version Control of Trees with Line-Based Version Control Systems
|
Fine-grained and accurate source code differencing
|
Geometric Network Comparisons
|
eng_Latn
| 4,637 |
ViewDroid: towards obfuscation-resilient mobile application repackaging detection
|
A first step towards algorithm plagiarism detection
|
Imaging of the pediatric airway.
|
eng_Latn
| 4,638 |
hal - the missing piece of the puzzle for hardware reverse engineering , trojan detection and insertion .
|
COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist
|
The Artificial Sweetener Splenda Promotes Gut Proteobacteria, Dysbiosis, and Myeloperoxidase Reactivity in Crohn’s Disease–Like Ileitis
|
eng_Latn
| 4,639 |
Cohesion and reuse in an object-oriented system
|
Measuring functional cohesion
|
Practical Strategies for Power-Efficient Computing Technologies
|
eng_Latn
| 4,640 |
Learning API usages from bytecode: a statistical approach
|
Mining idioms from source code
|
Multiscale Centerline Detection by Learning a Scale-Space Distance Transform
|
eng_Latn
| 4,641 |
Interlocking obfuscation for anti-tamper hardware
|
HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection
|
Effects of red pepper on appetite and energy intake
|
eng_Latn
| 4,642 |
Automated Whitebox Fuzz Testing
|
Analyzing Memory Accesses in x86 Executables
|
CLOUD DATA PATTERNS FOR CONFIDENTIALITY
|
eng_Latn
| 4,643 |
Protecting C++ Dynamic Dispatch Through VTable Interleaving
|
It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks
|
Continuous - Time Active Filter Design Using Signal - Flow Graphs
|
eng_Latn
| 4,644 |
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection
|
Predicting Vulnerable Software Components via Text Mining
|
24.7% Record Efficiency HIT Solar Cell on Thin Silicon Wafer
|
eng_Latn
| 4,645 |
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions
|
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
|
An Exploration of the Personal Software Process ( PSP )
|
eng_Latn
| 4,646 |
LAVA: Large-Scale Automated Vulnerability Addition
|
S2E: a platform for in-vivo multi-path analysis of software systems
|
QEMU, a Fast and Portable Dynamic Translator
|
yue_Hant
| 4,647 |
Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping
|
Malware Analysis and Classification: A Survey
|
Evaluation of multiple features for violent scenes detection
|
eng_Latn
| 4,648 |
Clone region descriptors: Representing and tracking duplication in source code
|
An empirical study of code clone genealogies
|
Damaged plasticity modelling of concrete in finite element analysis of reinforced concrete slabs
|
eng_Latn
| 4,649 |
A Systematic Mapping Study on Software Reuse
|
How reuse influences productivity in object-oriented systems
|
A Taxonomy of Attacks on the DNP3 Protocol
|
kor_Hang
| 4,650 |
vTPM: Virtualizing the trusted platform module
|
Live migration of virtual machines
|
Improving DPLL Solver Performance with Domain-Specific Heuristics: the ASP Case
|
eng_Latn
| 4,651 |
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach
|
Clone detection using abstract syntax trees
|
Schwannoma of the Nasal Tip: Diagnosis and Treatment
|
eng_Latn
| 4,652 |
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard
|
Evaluating the Effectiveness of Current Anti-ROP Defenses
|
Calibrating On-Wafer Probes to the Probe Tips
|
eng_Latn
| 4,653 |
Malware Classification Using Image Representation
|
Toward Automated Dynamic Malware Analysis Using CWSandbox
|
history of morgellons disease : from delusion to definition .
|
eng_Latn
| 4,654 |
Classification of hardware trojan detection techniques
|
RapidSmith: Do-It-Yourself CAD Tools for Xilinx FPGAs
|
Multiband excitation vocoder
|
eng_Latn
| 4,655 |
Code Pointer Masking: Hardening Applications against Code Injection Attacks
|
Low-level software security: Attacks and defenses
|
Tiled-MapReduce: optimizing resource usages of data-parallel applications on multicore with tiling
|
eng_Latn
| 4,656 |
ROP is still dangerous: breaking modern defenses
|
control - flow integrity .
|
Open-Source Syringe Pump Library
|
eng_Latn
| 4,657 |
SigMal: a static signal processing based malware triage
|
Data mining methods for detection of new malicious executables
|
A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
|
eng_Latn
| 4,658 |
Investigating Dependencies in Software Requirements for Change Propagation Analysis
|
Recovering traceability links between code and documentation
|
Total Synthesis of (+)-Virgatusin via AlCl3-Catalyzed [3 + 2] Cycloaddition.
|
eng_Latn
| 4,659 |
Derive: a tool that automatically reverse-engineers instruction encodings
|
C and tcc: a language and compiler for dynamic code generation
|
Lethargus is a Caenorhabditis elegans sleep-like state
|
eng_Latn
| 4,660 |
attribute - driven community search .
|
A fast algorithm for Steiner trees
|
Image visualization based malware detection
|
eng_Latn
| 4,661 |
Comprehensive formal verification of an OS microkernel
|
All Your IFCException Are Belong to Us
|
Geometry of Compositionality
|
eng_Latn
| 4,662 |
Web application attack detection and forensics: A survey
|
Forensic-by-Design Framework for Cyber-Physical Cloud Systems
|
Signature hiding techniques for FPGA intellectual property protection
|
eng_Latn
| 4,663 |
Using Data Analytics to Detect Anomalous States in Vehicles
|
A Mobile Knowledge-based System for On-Board Diagnostics and Car Driving Assistance
|
DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation
|
eng_Latn
| 4,664 |
PEBIL: Efficient static binary instrumentation for Linux
|
Pin: building customized program analysis tools with dynamic instrumentation
|
The Treatment of Internet Gaming Disorder: a Brief Overview of the PIPATIC Program
|
eng_Latn
| 4,665 |
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis
|
Static detection of cross-site scripting vulnerabilities
|
Modeling and implementing collaborative editing systems with transactional techniques
|
eng_Latn
| 4,666 |
GoldMine: Automatic assertion generation using data mining and static analysis
|
Rigel: an architecture and scalable programming interface for a 1000-core accelerator
|
Keyword advertising is not what you think: Clicking and eye movement behaviors on keyword advertising
|
eng_Latn
| 4,667 |
Hardware Trojans: Lessons Learned after One Decade of Research
|
Trojan Detection using IC Fingerprinting
|
Nonsuperconducting Fault Current Limiter With Controlling the Magnitudes of Fault Currents
|
eng_Latn
| 4,668 |
Opcode sequences as representation of executables for data-mining-based unknown malware detection
|
Principal Component Analysis
|
IoT-based fall detection system with energy efficient sensor nodes
|
eng_Latn
| 4,669 |
A study of the uniqueness of source code
|
DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones
|
Spatial ability and STEM: A sleeping giant for talent identification and development
|
eng_Latn
| 4,670 |
Are hardware performance counters a cost effective way for integrity checking of programs
|
Distilling free-form natural laws from experimental data
|
Three Is a Crowd - New Insights into Rosetting in Plasmodium falciparum.
|
eng_Latn
| 4,671 |
DRIP: A framework for purifying trojaned kernel drivers
|
QEMU, a Fast and Portable Dynamic Translator
|
DART: directed automated random testing
|
eng_Latn
| 4,672 |
2-2017 Lightweight data race detection for production runs
|
Pin: building customized program analysis tools with dynamic instrumentation
|
A High-Reliability, Low-Power Magnetic Full Adder
|
eng_Latn
| 4,673 |
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware
|
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
|
Reverse engineering of binary device drivers with RevNIC
|
eng_Latn
| 4,674 |
The static analysis of WannaCry ransomware
|
Dridex: Analysis of the traffic and automatic generation of IOCs
|
Outcomes of Polydioxanone Knotless Thread Lifting for Facial Rejuvenation
|
eng_Latn
| 4,675 |
Overcoming the obfuscation of Java programs by identifier renaming
|
Manufacturing cheap, resilient, and stealthy opaque constructs
|
Crowdsourcing, collaboration and creativity
|
eng_Latn
| 4,676 |
whyper : towards automating risk assessment of mobile applications .
|
A survey of mobile malware in the wild
|
Low power and low voltage VT extractor circuit and MOSFET radiation dosimeter
|
eng_Latn
| 4,677 |
Finding dispatcher gadgets for jump oriented programming code reuse attacks
|
ROPdefender: a detection tool to defend against return-oriented programming attacks
|
Xsens MVN: Full 6DOF Human Motion Tracking Using Miniature Inertial Sensors
|
eng_Latn
| 4,678 |
Towards a better collaboration of static and dynamic analyses for testing concurrent programs
|
Conditional must not aliasing for static race detection
|
Fast YOLO: A Fast You Only Look Once System for Real-time Embedded Object Detection in Video
|
eng_Latn
| 4,679 |
Code compression for embedded VLIW processors using variable-to-fixed coding
|
Compiler techniques for code compaction
|
Privacy Tipping Points in Smartphones Privacy Preferences
|
eng_Latn
| 4,680 |
Bug isolation via remote program sampling
|
Collaborative filtering with privacy
|
Implementing the Belief Propagation Algorithm in MATLAB
|
eng_Latn
| 4,681 |
ROPdefender: a detection tool to defend against return-oriented programming attacks
|
dynamic binary analysis and instrumentation .
|
Tongue-in-Groove Setback of the Medial Crura to Control Nasal Tip Deprojection in Open Rhinoplasty
|
eng_Latn
| 4,682 |
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC
|
Trustworthy Hardware: Identifying and Classifying Hardware Trojans
|
Dermatoscopy for Melanoma and Pigmented Lesions
|
eng_Latn
| 4,683 |
Auto-grading for parallel programs
|
Habanero-Java library: a Java 8 framework for multicore programming
|
Clone detection using abstract syntax trees
|
eng_Latn
| 4,684 |
Model-based whitebox fuzzing for program binaries
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Direct Intrinsics: Learning Albedo-Shading Decomposition by Convolutional Regression
|
eng_Latn
| 4,685 |
Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented Software
|
A METRICS SUITE FOR OBJECT ORIENTED DESIGN
|
Illuminant Aware Gamut-Based Color Transfer
|
eng_Latn
| 4,686 |
A behavior based malware detection scheme for avoiding false positive
|
A Layered Architecture for Detecting Malicious Behaviors
|
Stress and Memory: Behavioral Effects and Neurobiological Mechanisms
|
eng_Latn
| 4,687 |
de - obfuscation and detection of malicious pdf files with high accuracy .
|
Combining static and dynamic analysis for the detection of malicious documents
|
Insertion Transformer: Flexible Sequence Generation via Insertion Operations
|
eng_Latn
| 4,688 |
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks
|
Obfuscation of executable code to improve resistance to static disassembly
|
Automated Decision Support for Financial Regulatory/Policy Compliance, using Textual Rulelog
|
eng_Latn
| 4,689 |
Software persistent memory
|
CIL: Intermediate language and tools for analysis and transformation of C programs
|
Data Fusion
|
eng_Latn
| 4,690 |
Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space
|
Out of Control: Overcoming Control-Flow Integrity
|
VTint: Protecting Virtual Function Tables' Integrity
|
eng_Latn
| 4,691 |
Rozzle: De-cloaking Internet Malware
|
KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs
|
Valgrind: a framework for heavyweight dynamic binary instrumentation
|
eng_Latn
| 4,692 |
Cryptographically Enforced Control Flow Integrity
|
Enforcing forward-edge control-flow integrity in GCC & LLVM
|
chapter 9 watching you watch movies : using eye tracking to inform cognitive film theory .
|
eng_Latn
| 4,693 |
( DEPSCOR FY 09 ) Obfuscation and Deobfuscation of Intent of Computer Programs
|
Context-sensitive analysis without calling-context
|
Factors affecting wound healing.
|
eng_Latn
| 4,694 |
Model-based whitebox fuzzing for program binaries
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Towards Real-Time Object Detection on Embedded Systems
|
eng_Latn
| 4,695 |
Explanations for Regular Expressions
|
Automatic Network Protocol Analysis
|
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
|
eng_Latn
| 4,696 |
An adaptive FEC algorithm using hidden Markov chains
|
Adaptive FEC-based error control for Internet telephony
|
BareBox: efficient malware analysis on bare-metal
|
kor_Hang
| 4,697 |
Dridex: Analysis of the traffic and automatic generation of IOCs
|
Measuring and Detecting Fast-Flux Service Networks
|
Scalable, Behavior-Based Malware Clustering
|
eng_Latn
| 4,698 |
Windows API based Malware Detection and Framework Analysis
|
Eureka: A Framework for Enabling Static Malware Analysis
|
Multidimensional Bin Packing and Other Related Problems : A Survey ∗
|
eng_Latn
| 4,699 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.