Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
Hardware assisted control flow obfuscation for embedded processors | MiBench: A free, commercially representative embedded benchmark suite | Deterministic and stochastic optimal inventory control with logistic stock-dependent demand rate | eng_Latn | 4,600 |
An improvement to the SIFT descriptor for image representation and matching | Object retrieval with large vocabularies and fast spatial matching | Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis | eng_Latn | 4,601 |
LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code | Deobfuscation: reverse engineering obfuscated code | SUBGRAPH TRANSFORMATIONS FOR THE INEXACT MATCHING OF ATTRIBUTED RELATIONALGRAPHS | eng_Latn | 4,602 |
CODOMs: protecting software with code-centric memory domains | QEMU, a Fast and Portable Dynamic Translator | MINIX 3: a highly reliable, self-repairing operating system | eng_Latn | 4,603 |
Attack-Resilient State Estimation for Noisy Dynamical Systems | Comprehensive Experimental Analyses of Automotive Attack Surfaces | Malware Analysis using Multiple API Sequence Mining Control Flow Graph | kor_Hang | 4,604 |
On-demand transparency for improving hardware Trojan detectability | Trojan Detection using IC Fingerprinting | An Evidence-Based Framework for Strengthening Exercises to Prevent Hamstring Injury | eng_Latn | 4,605 |
Automated detection of logical errors in programs | Towards automatic generation of vulnerability-based signatures | Generating Big Data repositories for research in medical imaging | eng_Latn | 4,606 |
ABASH: finding bugs in bash scripts | The essence of command injection attacks in web applications | A novel 2.5bit SHA-less MDAC design for 10bit 100Ms pipeline ADC | eng_Latn | 4,607 |
Latent-Space Variational Bayes | Variational message passing | LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code | kor_Hang | 4,608 |
Intelligent code reviews using deep learning | Tricorder: building a program analysis ecosystem | A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention | eng_Latn | 4,609 |
BAP: A Binary Analysis Platform | A decision procedure for bit-vectors and arrays | Types and Programming Languages | kor_Hang | 4,610 |
Detecting unknown malicious code by applying classification techniques on OpCode patterns | Malware phylogeny generation using permutations of code | Inferencing in information extraction: Techniques and applications | eng_Latn | 4,611 |
Characterizing observability and controllability of software components | Abstract data types and software validation | CLEF 15 th Birthday : Past , Present , and Future | eng_Latn | 4,612 |
Exploring Multiple Execution Paths for Malware Analysis | Detecting kernel-level rootkits through binary analysis | Computer virus-antivirus coevolution | eng_Latn | 4,613 |
Stackguard: Simple stack smash protection for GCC | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services | kor_Hang | 4,614 |
Lens on the Endpoint: Hunting for Malicious Software Through Endpoint Data Analysis | Guilt by association: large scale malware detection by mining file-relation graphs | Static Analysis of Executables to Detect Malicious Patterns | eng_Latn | 4,615 |
Malware detection using assembly and API call sequences | A Taxonomy of Obfuscating Transformations | Survey on distance metric learning and dimensionality reduction in data mining | eng_Latn | 4,616 |
SKEE: A lightweight Secure Kernel-level Execution Environment for ARM | control - flow integrity . | Runtime countermeasures for code injection attacks against C and C++ programs | eng_Latn | 4,617 |
dejavu : a map of code duplicates on github . | A Survey on Software Clone Detection Research | MapReduce: simplified data processing on large clusters | eng_Latn | 4,618 |
Unleashing Mayhem on Binary Code | AEG: Automatic Exploit Generation | Dytan: a generic dynamic taint analysis framework | eng_Latn | 4,619 |
Reverse Engineering PL/SQL Legacy Code: An Experience Report | reverse engineering and design recovery : a taxonomy . | Flexible and Mindful Self-Tracking: Design Implications from Paper Bullet Journals | kor_Hang | 4,620 |
Better Malware Ground Truth: Techniques for Weighting Anti-Virus Vendor Labels | Structural detection of android malware using embedded call graphs | The MayaArch3D project: A 3D WebGIS for analyzing ancient architecture and landscapes | eng_Latn | 4,621 |
CANDID: preventing sql injection attacks using dynamic candidate evaluations | SQLrand: Preventing SQL Injection Attacks | Color Barcode Decoding in the Presence of Specular Reflection | eng_Latn | 4,622 |
Towards Effective Log Summarization | a classification of sql - injection attacks and countermeasures . | A branch and bound algorithm for extracting smallest minimal unsatisfiable subformulas | eng_Latn | 4,623 |
AURA: a programming language for authorization and audit | Interactive programs in dependent type theory | F.Live: Towards interactive live broadcast FTV experience | eng_Latn | 4,624 |
DIFUZE: Interface Aware Fuzzing for Kernel Drivers | QuickFuzz: an automatic random fuzzer for common file formats | Coarse to fine K nearest neighbor classifier | eng_Latn | 4,625 |
led - it - go : leaking ( a lot of ) data from air - gapped computers via the ( small ) hard drive led . | Exfiltration of information from air-gapped machines using monitor's LED indicator | ab initio algorithmic causal deconvolution of intertwined programs and networks by generative mechanism . | eng_Latn | 4,626 |
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation | Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware. | Driller: Augmenting Fuzzing Through Selective Symbolic Execution | eng_Latn | 4,627 |
Cooperation and security isolation of library OSes for multi-process applications | Leveraging Legacy Code to Deploy Desktop Applications on the Web | motivation parameters for engineering managers using maslow ’ s theory . | eng_Latn | 4,628 |
SimaticScan: towards a specialised vulnerability scanner for industrial control systems | AspFuzz: A state-aware protocol fuzzer based on application-layer protocols | Investigating Enactive Learning for Autonomous Intelligent Agents | eng_Latn | 4,629 |
Improving Loop Dependence Analysis | Pin: building customized program analysis tools with dynamic instrumentation | Dynamic Instrumentation of Production Systems | eng_Latn | 4,630 |
Address Oblivious Code Reuse: On the Effectiveness of Leakage-Resilient Diversity | Heisenbyte: Thwarting Memory Disclosure Attacks using Destructive Code Reads | Control-flow integrity principles, implementations, and applications | eng_Latn | 4,631 |
Behavior based software theft detection | Valgrind: a framework for heavyweight dynamic binary instrumentation | Automatic logging of operating system effects to guide application-level architecture simulation | eng_Latn | 4,632 |
Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey | A similarity metric method of obfuscated malware using function-call graph | VabCut: A video extension of GrabCut for unsupervised video foreground object segmentation | eng_Latn | 4,633 |
Do Hardware Cache Flushing Operations Actually Meet Our Expectations? | New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures | Phonotactic language recognition using i-vectors and phoneme posteriogram counts | eng_Latn | 4,634 |
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code | A Generic Approach to Automatic Deobfuscation of Executable Code | AEG: Automatic Exploit Generation | eng_Latn | 4,635 |
SGX-Shield: Enabling Address Space Layout Randomization for SGX Programs. | You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code | Review of recent developments in OR/MS research in disaster operations management | eng_Latn | 4,636 |
Precise Version Control of Trees with Line-Based Version Control Systems | Fine-grained and accurate source code differencing | Geometric Network Comparisons | eng_Latn | 4,637 |
ViewDroid: towards obfuscation-resilient mobile application repackaging detection | A first step towards algorithm plagiarism detection | Imaging of the pediatric airway. | eng_Latn | 4,638 |
hal - the missing piece of the puzzle for hardware reverse engineering , trojan detection and insertion . | COTD: Reference-Free Hardware Trojan Detection and Recovery Based on Controllability and Observability in Gate-Level Netlist | The Artificial Sweetener Splenda Promotes Gut Proteobacteria, Dysbiosis, and Myeloperoxidase Reactivity in Crohn’s Disease–Like Ileitis | eng_Latn | 4,639 |
Cohesion and reuse in an object-oriented system | Measuring functional cohesion | Practical Strategies for Power-Efficient Computing Technologies | eng_Latn | 4,640 |
Learning API usages from bytecode: a statistical approach | Mining idioms from source code | Multiscale Centerline Detection by Learning a Scale-Space Distance Transform | eng_Latn | 4,641 |
Interlocking obfuscation for anti-tamper hardware | HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection | Effects of red pepper on appetite and energy intake | eng_Latn | 4,642 |
Automated Whitebox Fuzz Testing | Analyzing Memory Accesses in x86 Executables | CLOUD DATA PATTERNS FOR CONFIDENTIALITY | eng_Latn | 4,643 |
Protecting C++ Dynamic Dispatch Through VTable Interleaving | It's a TRaP: Table Randomization and Protection against Function-Reuse Attacks | Continuous - Time Active Filter Design Using Signal - Flow Graphs | eng_Latn | 4,644 |
Predicting Vulnerable Software Components through N-Gram Analysis and Statistical Feature Selection | Predicting Vulnerable Software Components via Text Mining | 24.7% Record Efficiency HIT Solar Cell on Thin Silicon Wafer | eng_Latn | 4,645 |
CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions | PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware | An Exploration of the Personal Software Process ( PSP ) | eng_Latn | 4,646 |
LAVA: Large-Scale Automated Vulnerability Addition | S2E: a platform for in-vivo multi-path analysis of software systems | QEMU, a Fast and Portable Dynamic Translator | yue_Hant | 4,647 |
Virtual Machine Introspection Based Malware Behavior Profiling and Family Grouping | Malware Analysis and Classification: A Survey | Evaluation of multiple features for violent scenes detection | eng_Latn | 4,648 |
Clone region descriptors: Representing and tracking duplication in source code | An empirical study of code clone genealogies | Damaged plasticity modelling of concrete in finite element analysis of reinforced concrete slabs | eng_Latn | 4,649 |
A Systematic Mapping Study on Software Reuse | How reuse influences productivity in object-oriented systems | A Taxonomy of Attacks on the DNP3 Protocol | kor_Hang | 4,650 |
vTPM: Virtualizing the trusted platform module | Live migration of virtual machines | Improving DPLL Solver Performance with Domain-Specific Heuristics: the ASP Case | eng_Latn | 4,651 |
Comparison and Evaluation of Code Clone Detection Techniques and Tools: A Qualitative Approach | Clone detection using abstract syntax trees | Schwannoma of the Nasal Tip: Diagnosis and Treatment | eng_Latn | 4,652 |
Size does matter: why using gadget-chain length to prevent code-reuse attacks is hard | Evaluating the Effectiveness of Current Anti-ROP Defenses | Calibrating On-Wafer Probes to the Probe Tips | eng_Latn | 4,653 |
Malware Classification Using Image Representation | Toward Automated Dynamic Malware Analysis Using CWSandbox | history of morgellons disease : from delusion to definition . | eng_Latn | 4,654 |
Classification of hardware trojan detection techniques | RapidSmith: Do-It-Yourself CAD Tools for Xilinx FPGAs | Multiband excitation vocoder | eng_Latn | 4,655 |
Code Pointer Masking: Hardening Applications against Code Injection Attacks | Low-level software security: Attacks and defenses | Tiled-MapReduce: optimizing resource usages of data-parallel applications on multicore with tiling | eng_Latn | 4,656 |
ROP is still dangerous: breaking modern defenses | control - flow integrity . | Open-Source Syringe Pump Library | eng_Latn | 4,657 |
SigMal: a static signal processing based malware triage | Data mining methods for detection of new malicious executables | A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection | eng_Latn | 4,658 |
Investigating Dependencies in Software Requirements for Change Propagation Analysis | Recovering traceability links between code and documentation | Total Synthesis of (+)-Virgatusin via AlCl3-Catalyzed [3 + 2] Cycloaddition. | eng_Latn | 4,659 |
Derive: a tool that automatically reverse-engineers instruction encodings | C and tcc: a language and compiler for dynamic code generation | Lethargus is a Caenorhabditis elegans sleep-like state | eng_Latn | 4,660 |
attribute - driven community search . | A fast algorithm for Steiner trees | Image visualization based malware detection | eng_Latn | 4,661 |
Comprehensive formal verification of an OS microkernel | All Your IFCException Are Belong to Us | Geometry of Compositionality | eng_Latn | 4,662 |
Web application attack detection and forensics: A survey | Forensic-by-Design Framework for Cyber-Physical Cloud Systems | Signature hiding techniques for FPGA intellectual property protection | eng_Latn | 4,663 |
Using Data Analytics to Detect Anomalous States in Vehicles | A Mobile Knowledge-based System for On-Board Diagnostics and Car Driving Assistance | DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation | eng_Latn | 4,664 |
PEBIL: Efficient static binary instrumentation for Linux | Pin: building customized program analysis tools with dynamic instrumentation | The Treatment of Internet Gaming Disorder: a Brief Overview of the PIPATIC Program | eng_Latn | 4,665 |
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis | Static detection of cross-site scripting vulnerabilities | Modeling and implementing collaborative editing systems with transactional techniques | eng_Latn | 4,666 |
GoldMine: Automatic assertion generation using data mining and static analysis | Rigel: an architecture and scalable programming interface for a 1000-core accelerator | Keyword advertising is not what you think: Clicking and eye movement behaviors on keyword advertising | eng_Latn | 4,667 |
Hardware Trojans: Lessons Learned after One Decade of Research | Trojan Detection using IC Fingerprinting | Nonsuperconducting Fault Current Limiter With Controlling the Magnitudes of Fault Currents | eng_Latn | 4,668 |
Opcode sequences as representation of executables for data-mining-based unknown malware detection | Principal Component Analysis | IoT-based fall detection system with energy efficient sensor nodes | eng_Latn | 4,669 |
A study of the uniqueness of source code | DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones | Spatial ability and STEM: A sleeping giant for talent identification and development | eng_Latn | 4,670 |
Are hardware performance counters a cost effective way for integrity checking of programs | Distilling free-form natural laws from experimental data | Three Is a Crowd - New Insights into Rosetting in Plasmodium falciparum. | eng_Latn | 4,671 |
DRIP: A framework for purifying trojaned kernel drivers | QEMU, a Fast and Portable Dynamic Translator | DART: directed automated random testing | eng_Latn | 4,672 |
2-2017 Lightweight data race detection for production runs | Pin: building customized program analysis tools with dynamic instrumentation | A High-Reliability, Low-Power Magnetic Full Adder | eng_Latn | 4,673 |
UFO - Hidden Backdoor Discovery and Security Verification in IoT Device Firmware | Towards Automated Dynamic Analysis for Linux-based Embedded Firmware | Reverse engineering of binary device drivers with RevNIC | eng_Latn | 4,674 |
The static analysis of WannaCry ransomware | Dridex: Analysis of the traffic and automatic generation of IOCs | Outcomes of Polydioxanone Knotless Thread Lifting for Facial Rejuvenation | eng_Latn | 4,675 |
Overcoming the obfuscation of Java programs by identifier renaming | Manufacturing cheap, resilient, and stealthy opaque constructs | Crowdsourcing, collaboration and creativity | eng_Latn | 4,676 |
whyper : towards automating risk assessment of mobile applications . | A survey of mobile malware in the wild | Low power and low voltage VT extractor circuit and MOSFET radiation dosimeter | eng_Latn | 4,677 |
Finding dispatcher gadgets for jump oriented programming code reuse attacks | ROPdefender: a detection tool to defend against return-oriented programming attacks | Xsens MVN: Full 6DOF Human Motion Tracking Using Miniature Inertial Sensors | eng_Latn | 4,678 |
Towards a better collaboration of static and dynamic analyses for testing concurrent programs | Conditional must not aliasing for static race detection | Fast YOLO: A Fast You Only Look Once System for Real-time Embedded Object Detection in Video | eng_Latn | 4,679 |
Code compression for embedded VLIW processors using variable-to-fixed coding | Compiler techniques for code compaction | Privacy Tipping Points in Smartphones Privacy Preferences | eng_Latn | 4,680 |
Bug isolation via remote program sampling | Collaborative filtering with privacy | Implementing the Belief Propagation Algorithm in MATLAB | eng_Latn | 4,681 |
ROPdefender: a detection tool to defend against return-oriented programming attacks | dynamic binary analysis and instrumentation . | Tongue-in-Groove Setback of the Medial Crura to Control Nasal Tip Deprojection in Open Rhinoplasty | eng_Latn | 4,682 |
Red team vs. blue team hardware trojan analysis: detection of a hardware trojan on an actual ASIC | Trustworthy Hardware: Identifying and Classifying Hardware Trojans | Dermatoscopy for Melanoma and Pigmented Lesions | eng_Latn | 4,683 |
Auto-grading for parallel programs | Habanero-Java library: a Java 8 framework for multicore programming | Clone detection using abstract syntax trees | eng_Latn | 4,684 |
Model-based whitebox fuzzing for program binaries | Pin: building customized program analysis tools with dynamic instrumentation | Direct Intrinsics: Learning Albedo-Shading Decomposition by Convolutional Regression | eng_Latn | 4,685 |
Using Software Metrics Thresholds to Predict Fault-Prone Classes in Object-Oriented Software | A METRICS SUITE FOR OBJECT ORIENTED DESIGN | Illuminant Aware Gamut-Based Color Transfer | eng_Latn | 4,686 |
A behavior based malware detection scheme for avoiding false positive | A Layered Architecture for Detecting Malicious Behaviors | Stress and Memory: Behavioral Effects and Neurobiological Mechanisms | eng_Latn | 4,687 |
de - obfuscation and detection of malicious pdf files with high accuracy . | Combining static and dynamic analysis for the detection of malicious documents | Insertion Transformer: Flexible Sequence Generation via Insertion Operations | eng_Latn | 4,688 |
Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks | Obfuscation of executable code to improve resistance to static disassembly | Automated Decision Support for Financial Regulatory/Policy Compliance, using Textual Rulelog | eng_Latn | 4,689 |
Software persistent memory | CIL: Intermediate language and tools for analysis and transformation of C programs | Data Fusion | eng_Latn | 4,690 |
Feel Me Flow: A Review of Control-Flow Integrity Methods for User and Kernel Space | Out of Control: Overcoming Control-Flow Integrity | VTint: Protecting Virtual Function Tables' Integrity | eng_Latn | 4,691 |
Rozzle: De-cloaking Internet Malware | KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs | Valgrind: a framework for heavyweight dynamic binary instrumentation | eng_Latn | 4,692 |
Cryptographically Enforced Control Flow Integrity | Enforcing forward-edge control-flow integrity in GCC & LLVM | chapter 9 watching you watch movies : using eye tracking to inform cognitive film theory . | eng_Latn | 4,693 |
( DEPSCOR FY 09 ) Obfuscation and Deobfuscation of Intent of Computer Programs | Context-sensitive analysis without calling-context | Factors affecting wound healing. | eng_Latn | 4,694 |
Model-based whitebox fuzzing for program binaries | Pin: building customized program analysis tools with dynamic instrumentation | Towards Real-Time Object Detection on Embedded Systems | eng_Latn | 4,695 |
Explanations for Regular Expressions | Automatic Network Protocol Analysis | Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution | eng_Latn | 4,696 |
An adaptive FEC algorithm using hidden Markov chains | Adaptive FEC-based error control for Internet telephony | BareBox: efficient malware analysis on bare-metal | kor_Hang | 4,697 |
Dridex: Analysis of the traffic and automatic generation of IOCs | Measuring and Detecting Fast-Flux Service Networks | Scalable, Behavior-Based Malware Clustering | eng_Latn | 4,698 |
Windows API based Malware Detection and Framework Analysis | Eureka: A Framework for Enabling Static Malware Analysis | Multidimensional Bin Packing and Other Related Problems : A Survey ∗ | eng_Latn | 4,699 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.