Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
Refactoring programs to secure information flows
Evolving object-oriented designs with refactorings
Object existence probability fusion using dempster-shafer theory in a high-level sensor data fusion architecture
eng_Latn
4,700
Principles of Layered Attestation
Linux kernel integrity measurement using contextual inspection
Towards a Taxonomy of Bad Smells Detection Approaches
eng_Latn
4,701
Robust Hashing for Image-based Malware Classification
Malware detection based on opcode frequency
A cortical representation of the local visual environment
eng_Latn
4,702
An AST-based Code Plagiarism Detection Algorithm
Clone detection using abstract syntax trees
Numerical analysis of the SF6 dielectric recovery in high voltage circuit-breakers around current zero
eng_Latn
4,703
A compiler-level intermediate representation based binary analysis and rewriting system
efficient , transparent , and comprehensive runtime code manipulation .
A decision procedure for bit-vectors and arrays
eng_Latn
4,704
An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance
Evaluation of malware phylogeny modelling systems using automated variant generation
the elements of statistical learning : data mining , inference , and prediction , 2nd edition .
eng_Latn
4,705
Malware detection based on opcode frequency
In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
TextBoxes++: A Single-Shot Oriented Scene Text Detector
eng_Latn
4,706
Proposal Techniques and Solutions for Addressing Ransomware Attacks
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook
Visual cues can modulate integration and segregation of objects in auditory scene analysis
eng_Latn
4,707
branch prediction and the performance of interpreters — don ' t trust folklore .
Pin: building customized program analysis tools with dynamic instrumentation
Points-to analysis for JavaScript
eng_Latn
4,708
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis
Automated concolic testing of smartphone apps
Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks
eng_Latn
4,709
Model-Driven Engineering as a new landscape for traceability management: A systematic literature review
Model Driven Engineering
Secure Virtual Machine Execution under an Untrusted Management OS
eng_Latn
4,710
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Detecting Environment-Sensitive Malware
Oil Biodegradation and Bioremediation: A Tale of the Two Worst Spills in U.S. History
eng_Latn
4,711
Integrity-Based Kernel Malware Detection
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
Anatomy of the Midface
eng_Latn
4,712
Defining metrics for continuous delivery and deployment pipeline
On the journey to continuous deployment: technical and social challenges along the way
Deobfuscation: Improving reverse engineering of obfuscated code
eng_Latn
4,713
analysis of a software product line architecture : an experience report .
Scenario-Based Analysis of Software Architecture
Architecting a common-source-line array for bipolar non-volatile memory devices
eng_Latn
4,714
An entropy-based distance measure for analyzing and detecting metamorphic malware
MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API
Attachment style
eng_Latn
4,715
Covert channels using mobile device's magnetic field sensors
A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events
An Ontological Analysis of Value Propositions
eng_Latn
4,716
Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata.
Binary Codes Capable of Correcting Deletions, Insertions and Reversals
A second generation computer forensic analysis system
deu_Latn
4,717
On the feasibility of online malware detection with performance counters
Automated classification and analysis of internet malware
the sustainability balanced scorecard – linking sustainability management to business strategy .
eng_Latn
4,718
A course-based usability analysis of Cilk Plus and OpenMP
Capturing and analyzing low-level events from the code editor
Securing DNP3 Broadcast Communications in SCADA Systems
eng_Latn
4,719
Comparing static bug finders and statistical prediction
Sound and precise analysis of web applications for injection vulnerabilities
Flow cytometry combined with viSNE for the analysis of microbial biofilms and detection of microplastics
eng_Latn
4,720
RADAR: an in-building RF-based user location and tracking system
The X-tree : An Index Structure for High-Dimensional Data
Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis
eng_Latn
4,721
Query optimization of distributed pattern matching
Matching Structure and Semantics: A Survey on Graph-Based Pattern Matching
GPLAG: detection of software plagiarism by program dependence graph analysis
eng_Latn
4,722
Low-level software security: Attacks and defenses
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
eng_Latn
4,723
An undergraduate course on software bug detection tools and techniques
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
How to share a secret
eng_Latn
4,724
Malware Characterization Using WindowsAPI Call Sequences
Malware Analysis and Classification: A Survey
On the Optimality of the Simple Bayesian Classifier under Zero-One Loss
kor_Hang
4,725
Applying Memory Forensics to Rootkit Detection
Cloaker: Hardware Supported Rootkit Concealment
Call center performance evaluation using big data analytics
eng_Latn
4,726
Efficient SIMD code generation for runtime alignment and length conversion
Automatic Intra-Register Vectorization for the Intel® Architecture
Oows: A method to develop web applications from web-oriented conceptual models
eng_Latn
4,727
Optimized invariant representation of network traffic for detecting unseen malware variants
Automatic Generation of String Signatures for Malware Detection
Clustering small-sized collections of short texts
eng_Latn
4,728
On Reverse Engineering-Based Hardware Trojan Detection
A Survey of Hardware Trojan Taxonomy and Detection
The role of double-strand break repair — insights from human genetics
eng_Latn
4,729
Efficient validation input generation in RTL by hybridized source code analysis
A System to Generate Test Data and Symbolically Execute Programs
Rigel: an architecture and scalable programming interface for a 1000-core accelerator
eng_Latn
4,730
Malware Classification Using N-grams Sequential Pattern Features
C4.5: Programs for Machine Learning
A Taxonomy of Obfuscating Transformations
eng_Latn
4,731
control - flow integrity .
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise
eng_Latn
4,732
Cognitive modeling of polymorphic malware using fractal based semantic characterization
Panorama: capturing system-wide information flow for malware detection and analysis
Evaluation of medicated feeds with antiparasitical and immune-enhanced Chinese herbal medicines against Ichthyophthirius multifiliis in grass carp (Ctenopharyngodon idellus)
eng_Latn
4,733
Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks
Formal Verification of Smart Contracts: Short Paper
Formalizing the LLVM intermediate representation for verified program transformations
eng_Latn
4,734
Dead Code Detection Method Based on Program Slicing
Deobfuscation: reverse engineering obfuscated code
Large Scale URL-based Classification Using Online Incremental Learning
eng_Latn
4,735
Monotonic models for real-time dynamic malware detection
Malicious Behavior Detection using Windows Audit Logs
C20orf20 (MRG-binding protein) as a potential therapeutic target for colorectal cancer
eng_Latn
4,736
On the Relation between External Software Quality and Static Code Analysis
A METRICS SUITE FOR OBJECT ORIENTED DESIGN
New sampling formulae for non-bandlimited signals associated with linear canonical transform and nonlinear Fourier atoms
eng_Latn
4,737
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM
G-Free: defeating return-oriented programming through gadget-less binaries
The Economic Impact of Helmet Use on Motorcycle Accidents: A Systematic Review and Meta-analysis of the Literature from the Past 20 Years
eng_Latn
4,738
An Architectural Smells Detection Tool for C and C++ Projects
Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells
Measuring Relational Aggression in Middle Childhood in a Multi-Informant Multi-Method Study
eng_Latn
4,739
doppelganger : a cache for approximate computing .
Pin: building customized program analysis tools with dynamic instrumentation
Using Software Non-Functional Assessment Process to Complement Function Points for Software Maintenance
eng_Latn
4,740
Comparing the effectiveness of commercial obfuscators against MATE attacks
Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection
Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm
eng_Latn
4,741
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization
Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms
Using DNA to program the self-assembly of colloidal nanoparticles and microparticles
eng_Latn
4,742
QuickFuzz: an automatic random fuzzer for common file formats
Grammar-based whitebox fuzzing
Generic Application-Level Protocol Analyzer and its Language
eng_Latn
4,743
SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks
CCured in the real world
intelligent evolutionary design : a new approach to optimizing complex engineering systems and its application to designing heat exchangers .
kor_Hang
4,744
An Introduction to Verification of Visualization Techniques
seL4: formal verification of an OS kernel
Terra: a virtual machine-based platform for trusted computing
kor_Hang
4,745
Evolution of evasive malwares: A survey
SubVirt: implementing malware with virtual machines
Radar Emitter Recognition in Airborne RWR/ESM Based on Improved K Nearest Neighbor Algorithm
eng_Latn
4,746
BinPro: A tool for binary backdoor accountability in code audits
Blanket execution: dynamic similarity testing for program binaries and components
The Genomic Landscape of Response to EGFR Blockade in Colorectal Cancer
eng_Latn
4,747
Securing web application code by static analysis and runtime protection
Flow-sensitive type qualifiers
A Phosphate-Binding Pocket within the Platform-PAZ-Connector Helix Cassette of Human Dicer.
eng_Latn
4,748
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
DLR-Hand II: next generation of a dextrous robot hand
eng_Latn
4,749
A heuristic approach for detection of obfuscated malware
A semantics-based approach to malware detection
A framework of mobile transaction use : the user's perspective
eng_Latn
4,750
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization
Automatic Reverse Engineering of Malware Emulators
Sketch2normal: deep networks for normal map generation
eng_Latn
4,751
TypeSan: Practical Type Confusion Detection
control - flow integrity .
Efficient software-based fault isolation
eng_Latn
4,752
AEG: Automatic Exploit Generation
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
Scalable, Behavior-Based Malware Clustering
kor_Hang
4,753
Deep Analysis of Binary Code to Recover Program Structure
BAP: A Binary Analysis Platform
Designing Business Models for the Internet of Things
kor_Hang
4,754
Modelling Slotted-ALOHA Simulator Using Computational Spreadsheet Based e-Forms
The mole concept using MS Excel
Hardware-software integrated approaches to defend against software cache-based side channel attacks
kor_Hang
4,755
Three control flow obfuscation methods for Java software
Manufacturing cheap, resilient, and stealthy opaque constructs
Software Structure Metrics Based on Information Flow
eng_Latn
4,756
portable and efficient auto - vectorized bytecode : a look at the interaction between static and jit compilers .
Split Compilation: an Application to Just-in-Time Vectorization
Functions and mechanisms of epigenetic inheritance in animals
eng_Latn
4,757
Annotated Control Flow Graph for Metamorphic Malware Detection
Dynamic malware detection using registers values set analysis
Obfuscation of executable code to improve resistance to static disassembly
eng_Latn
4,758
defis de la securite de l ' information . support a la gestion des risques de securite par les modeles .
Using abuse case models for security requirements analysis
Defeating return-oriented rootkits with "Return-Less" kernels
fra_Latn
4,759
learning physical dynamics .
terpret : a probabilistic programming language for program induction .
Virtual ghost: protecting applications from hostile operating systems
eng_Latn
4,760
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis
A Survey of Hardware Trojan Taxonomy and Detection
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
eng_Latn
4,761
Identification of Refused Bequest Code Smells
design patterns : elements of reusable object - oriented software .
Precocious Puberty
eng_Latn
4,762
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
CRITICAL SUCCESS FACTORS FOR DATA WAREHOUSING: A CLASSIC ANSWER TO A MODERN QUESTION
eng_Latn
4,763
Extracting Conditional Formulas for Cross-Platform Bug Search
Leveraging semantic signatures for bug search in binary programs
Detecting bad smells in source code using change history information
eng_Latn
4,764
Who Wrote This Code? Identifying the Authors of Program Binaries
Winnowing: local algorithms for document fingerprinting
SERT and NET occupancy by venlafaxine and milnacipran in nonhuman primates: a PET study
eng_Latn
4,765
Logical Attacks on Secured Containers of the Java Card Platform
Developing a Trojan applets in a smart card
Video summarization: techniques and classification
eng_Latn
4,766
Malware Analysis using Multiple API Sequence Mining Control Flow Graph
IMDS: intelligent malware detection system
The Influence of Carbon Dioxide on Brain Activity and Metabolism in Conscious Humans
eng_Latn
4,767
Toward the efficient use of multiple explicitly managed memory subsystems
dynamic binary analysis and instrumentation .
The Emergence of Canalization and Evolvability in an Open-Ended, Interactive Evolutionary System
eng_Latn
4,768
Security Analysis of PHP Bytecode Protection Mechanisms
Obfuscation of executable code to improve resistance to static disassembly
Do Energy Efficiency Investments Deliver at the Right Time
kor_Hang
4,769
Architectural Data Flow Analysis
Challenges in Secure Software Evolution - The Role of Software Architecture
A New Calibration Method for Current and Voltage Sensors Used in Power Quality Measurements
kor_Hang
4,770
A Survey of Prevention/Mitigation against Memory Corruption Attacks
AddressSanitizer : A Fast Address Sanity Checker
CLOPE: a fast and effective clustering algorithm for transactional data
eng_Latn
4,771
Selecting a set of appropriate metrics for detecting code clones
Substring matching for clone detection and change tracking
RacerX: effective, static detection of race conditions and deadlocks
eng_Latn
4,772
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows
Exploring Multiple Execution Paths for Malware Analysis
Automated classification and analysis of internet malware
kor_Hang
4,773
Dynamic Malware Detection Using API Similarity
Malware Detection Using Dynamic Birthmarks
Neurofeedback for the treatment of schizophrenia: Case study
eng_Latn
4,774
Detection of Metamorphic Malware based on HMM: A Hierarchical Approach
A tutorial on hidden Markov models and selected applications in speech recognition
Opcode graph similarity and metamorphic detection
eng_Latn
4,775
Applying Memory Forensics to Rootkit Detection
Cloaker: Hardware Supported Rootkit Concealment
A Virtual Machine Introspection Based Architecture for Intrusion Detection
eng_Latn
4,776
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information
A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins
Predictors of physical restraint use in Canadian intensive care units
eng_Latn
4,777
A malware detection system based on intermediate language
Polymorphic Malware Detection Using Sequence Classification Methods
Communication Needs of Elderly at Risk of Falls and their Remote Family
eng_Latn
4,778
Transparent Runtime Shadow Stack: Protection against malicious return address modifications
A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention
A Multi-objective Framework for Location Recommendation Based on User Preference
eng_Latn
4,779
Combining static and dynamic analysis for the detection of malicious documents
Toward Automated Dynamic Malware Analysis Using CWSandbox
A Semantic Model for Information Sharing in Autonomous Vehicle Systems
eng_Latn
4,780
Generalized vulnerability extrapolation using abstract syntax trees
Pixy: a static analysis tool for detecting Web application vulnerabilities
Why is Speech Recognition Difficult?
eng_Latn
4,781
An Eclipse plug-in for Test-to-Code Traceability Recovery
Program slicing: methods and applications
Applications of approximation algorithms to cooperative games
kor_Hang
4,782
Graph-based malware detection using dynamic analysis
Learning and Classification of Malware Behavior
Inferring Cognitive Models from Data using Approximate Bayesian Computation
eng_Latn
4,783
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems
ATRA: Address Translation Redirection Attack against Hardware-based External Monitors
Similarity in Semantic Graphs: Combining Structural, Literal, and Ontology-based Measures
eng_Latn
4,784
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
Design Study Methodology: Reflections from the Trenches and the Stacks
EEG theta/beta ratio in relation to fear-modulated response-inhibition, attentional control, and affective traits
eng_Latn
4,785
Dynamically Translating x86 to LLVM using QEMU
Selective Symbolic Execution
Automated Whitebox Fuzz Testing
eng_Latn
4,786
Improving malware detection time by using RLE and N-gram
Approximate graph edit distance computation by means of bipartite graph matching
An analytical model for predicting the remaining battery capacity of lithium-ion batteries
eng_Latn
4,787
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases
Privacy Preserving Data Mining
An efficient and generic reversible debugger using the virtual machine based approach
eng_Latn
4,788
A case study on the relationship between code ownership and refactoring activities in a Java software system
Template-based reconstruction of complex refactorings
Simulation of ion implantation for CMOS 1µm using SILVACO tools
eng_Latn
4,789
First-Order Bayesian Logic
A Language and Program for Complex Bayesian Modelling
K-Tracer: A System for Extracting Kernel Malware Behavior
kor_Hang
4,790
A Knowledge-Assisted Visual Malware Analysis System: Design, Validation, and Reflection of KAMAS
about face 3 : the essentials of interaction design .
Engineered nanomaterials for water treatment and remediation: Costs, benefits, and applicability
kor_Hang
4,791
Who Wrote This Code? Identifying the Authors of Program Binaries
Malware phylogeny generation using permutations of code
Efficient randomized pattern-matching algorithms
eng_Latn
4,792
Ensuring operating system kernel integrity with OSck
Non-control-data attacks are realistic threats
A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors
eng_Latn
4,793
ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
Graph-based anomaly detection
A Comparison of Static Analysis Tools for Vulnerability Detection in C / C + + Code
yue_Hant
4,794
APISan: Sanitizing {API} Usages through Semantic Cross-Checking
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
2Vrms 16Ω switching headphone driver with 82% peak efficiency, 102 dB SNDR and 1.1mA/channel quiescent current
eng_Latn
4,795
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations
BitBlaze: A new approach to computer security via binary analysis
Advanced Compiler Design and Implementation
kor_Hang
4,796
On the Feasibility of Malware Authorship Attribution
refactoring improving the design of existing code .
Image Completion Approaches Using the Statistics of Similar Patches
eng_Latn
4,797
RainbowNet : Color Extrapolation from Grayscale Images
Colorful Image Colorization
dynamic software birthmarks to detect the theft of windows applications .
eng_Latn
4,798
CPAchecker: A Tool for Configurable Software Verification
The SLAM project: debugging system software via static analysis
The Distributed Nature of Working Memory
eng_Latn
4,799