Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
Refactoring programs to secure information flows | Evolving object-oriented designs with refactorings | Object existence probability fusion using dempster-shafer theory in a high-level sensor data fusion architecture | eng_Latn | 4,700 |
Principles of Layered Attestation | Linux kernel integrity measurement using contextual inspection | Towards a Taxonomy of Bad Smells Detection Approaches | eng_Latn | 4,701 |
Robust Hashing for Image-based Malware Classification | Malware detection based on opcode frequency | A cortical representation of the local visual environment | eng_Latn | 4,702 |
An AST-based Code Plagiarism Detection Algorithm | Clone detection using abstract syntax trees | Numerical analysis of the SF6 dielectric recovery in high voltage circuit-breakers around current zero | eng_Latn | 4,703 |
A compiler-level intermediate representation based binary analysis and rewriting system | efficient , transparent , and comprehensive runtime code manipulation . | A decision procedure for bit-vectors and arrays | eng_Latn | 4,704 |
An Alternative to NCD for Large Sequences, Lempel-Ziv Jaccard Distance | Evaluation of malware phylogeny modelling systems using automated variant generation | the elements of statistical learning : data mining , inference , and prediction , 2nd edition . | eng_Latn | 4,705 |
Malware detection based on opcode frequency | In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS | TextBoxes++: A Single-Shot Oriented Scene Text Detector | eng_Latn | 4,706 |
Proposal Techniques and Solutions for Addressing Ransomware Attacks | Prudent Practices for Designing Malware Experiments: Status Quo and Outlook | Visual cues can modulate integration and segregation of objects in auditory scene analysis | eng_Latn | 4,707 |
branch prediction and the performance of interpreters — don ' t trust folklore . | Pin: building customized program analysis tools with dynamic instrumentation | Points-to analysis for JavaScript | eng_Latn | 4,708 |
DexLego: Reassembleable Bytecode Extraction for Aiding Static Analysis | Automated concolic testing of smartphone apps | Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks | eng_Latn | 4,709 |
Model-Driven Engineering as a new landscape for traceability management: A systematic literature review | Model Driven Engineering | Secure Virtual Machine Execution under an Untrusted Management OS | eng_Latn | 4,710 |
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities | Detecting Environment-Sensitive Malware | Oil Biodegradation and Bioremediation: A Tale of the Two Worst Spills in U.S. History | eng_Latn | 4,711 |
Integrity-Based Kernel Malware Detection | Remote attestation to dynamic system properties: Towards providing complete system integrity evidence | Anatomy of the Midface | eng_Latn | 4,712 |
Defining metrics for continuous delivery and deployment pipeline | On the journey to continuous deployment: technical and social challenges along the way | Deobfuscation: Improving reverse engineering of obfuscated code | eng_Latn | 4,713 |
analysis of a software product line architecture : an experience report . | Scenario-Based Analysis of Software Architecture | Architecting a common-source-line array for bipolar non-volatile memory devices | eng_Latn | 4,714 |
An entropy-based distance measure for analyzing and detecting metamorphic malware | MEDUSA: MEtamorphic malware dynamic analysis usingsignature from API | Attachment style | eng_Latn | 4,715 |
Covert channels using mobile device's magnetic field sensors | A Practical Methodology for Measuring the Side-Channel Signal Available to the Attacker for Instruction-Level Events | An Ontological Analysis of Value Propositions | eng_Latn | 4,716 |
Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata. | Binary Codes Capable of Correcting Deletions, Insertions and Reversals | A second generation computer forensic analysis system | deu_Latn | 4,717 |
On the feasibility of online malware detection with performance counters | Automated classification and analysis of internet malware | the sustainability balanced scorecard – linking sustainability management to business strategy . | eng_Latn | 4,718 |
A course-based usability analysis of Cilk Plus and OpenMP | Capturing and analyzing low-level events from the code editor | Securing DNP3 Broadcast Communications in SCADA Systems | eng_Latn | 4,719 |
Comparing static bug finders and statistical prediction | Sound and precise analysis of web applications for injection vulnerabilities | Flow cytometry combined with viSNE for the analysis of microbial biofilms and detection of microplastics | eng_Latn | 4,720 |
RADAR: an in-building RF-based user location and tracking system | The X-tree : An Index Structure for High-Dimensional Data | Security Patterns from Intelligent Data: A Map of Software Vulnerability Analysis | eng_Latn | 4,721 |
Query optimization of distributed pattern matching | Matching Structure and Semantics: A Survey on Graph-Based Pattern Matching | GPLAG: detection of software plagiarism by program dependence graph analysis | eng_Latn | 4,722 |
Low-level software security: Attacks and defenses | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services | eng_Latn | 4,723 |
An undergraduate course on software bug detection tools and techniques | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | How to share a secret | eng_Latn | 4,724 |
Malware Characterization Using WindowsAPI Call Sequences | Malware Analysis and Classification: A Survey | On the Optimality of the Simple Bayesian Classifier under Zero-One Loss | kor_Hang | 4,725 |
Applying Memory Forensics to Rootkit Detection | Cloaker: Hardware Supported Rootkit Concealment | Call center performance evaluation using big data analytics | eng_Latn | 4,726 |
Efficient SIMD code generation for runtime alignment and length conversion | Automatic Intra-Register Vectorization for the Intel® Architecture | Oows: A method to develop web applications from web-oriented conceptual models | eng_Latn | 4,727 |
Optimized invariant representation of network traffic for detecting unseen malware variants | Automatic Generation of String Signatures for Malware Detection | Clustering small-sized collections of short texts | eng_Latn | 4,728 |
On Reverse Engineering-Based Hardware Trojan Detection | A Survey of Hardware Trojan Taxonomy and Detection | The role of double-strand break repair — insights from human genetics | eng_Latn | 4,729 |
Efficient validation input generation in RTL by hybridized source code analysis | A System to Generate Test Data and Symbolically Execute Programs | Rigel: an architecture and scalable programming interface for a 1000-core accelerator | eng_Latn | 4,730 |
Malware Classification Using N-grams Sequential Pattern Features | C4.5: Programs for Machine Learning | A Taxonomy of Obfuscating Transformations | eng_Latn | 4,731 |
control - flow integrity . | Address obfuscation: an efficient approach to combat a broad range of memory error exploits | A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise | eng_Latn | 4,732 |
Cognitive modeling of polymorphic malware using fractal based semantic characterization | Panorama: capturing system-wide information flow for malware detection and analysis | Evaluation of medicated feeds with antiparasitical and immune-enhanced Chinese herbal medicines against Ichthyophthirius multifiliis in grass carp (Ctenopharyngodon idellus) | eng_Latn | 4,733 |
Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks | Formal Verification of Smart Contracts: Short Paper | Formalizing the LLVM intermediate representation for verified program transformations | eng_Latn | 4,734 |
Dead Code Detection Method Based on Program Slicing | Deobfuscation: reverse engineering obfuscated code | Large Scale URL-based Classification Using Online Incremental Learning | eng_Latn | 4,735 |
Monotonic models for real-time dynamic malware detection | Malicious Behavior Detection using Windows Audit Logs | C20orf20 (MRG-binding protein) as a potential therapeutic target for colorectal cancer | eng_Latn | 4,736 |
On the Relation between External Software Quality and Static Code Analysis | A METRICS SUITE FOR OBJECT ORIENTED DESIGN | New sampling formulae for non-bandlimited signals associated with linear canonical transform and nonlinear Fourier atoms | eng_Latn | 4,737 |
Gadge me if you can: secure and efficient ad-hoc instruction-level randomization for x86 and ARM | G-Free: defeating return-oriented programming through gadget-less binaries | The Economic Impact of Helmet Use on Motorcycle Accidents: A Systematic Review and Meta-analysis of the Literature from the Past 20 Years | eng_Latn | 4,738 |
An Architectural Smells Detection Tool for C and C++ Projects | Hotspot Patterns: The Formal Definition and Automatic Detection of Architecture Smells | Measuring Relational Aggression in Middle Childhood in a Multi-Informant Multi-Method Study | eng_Latn | 4,739 |
doppelganger : a cache for approximate computing . | Pin: building customized program analysis tools with dynamic instrumentation | Using Software Non-Functional Assessment Process to Complement Function Points for Software Maintenance | eng_Latn | 4,740 |
Comparing the effectiveness of commercial obfuscators against MATE attacks | Watermarking, Tamper-Proofing, and Obfuscation -- Tools for Software Protection | Solving Cryptarithmetic Problems Using Parallel Genetic Algorithm | eng_Latn | 4,741 |
Transparent Protection of Commodity OS Kernels Using Hardware Virtualization | Return-Oriented Rootkits: Bypassing Kernel Code Integrity Protection Mechanisms | Using DNA to program the self-assembly of colloidal nanoparticles and microparticles | eng_Latn | 4,742 |
QuickFuzz: an automatic random fuzzer for common file formats | Grammar-based whitebox fuzzing | Generic Application-Level Protocol Analyzer and its Language | eng_Latn | 4,743 |
SAFEDISPATCH: Securing C++ Virtual Calls from Memory Corruption Attacks | CCured in the real world | intelligent evolutionary design : a new approach to optimizing complex engineering systems and its application to designing heat exchangers . | kor_Hang | 4,744 |
An Introduction to Verification of Visualization Techniques | seL4: formal verification of an OS kernel | Terra: a virtual machine-based platform for trusted computing | kor_Hang | 4,745 |
Evolution of evasive malwares: A survey | SubVirt: implementing malware with virtual machines | Radar Emitter Recognition in Airborne RWR/ESM Based on Improved K Nearest Neighbor Algorithm | eng_Latn | 4,746 |
BinPro: A tool for binary backdoor accountability in code audits | Blanket execution: dynamic similarity testing for program binaries and components | The Genomic Landscape of Response to EGFR Blockade in Colorectal Cancer | eng_Latn | 4,747 |
Securing web application code by static analysis and runtime protection | Flow-sensitive type qualifiers | A Phosphate-Binding Pocket within the Platform-PAZ-Connector Helix Cassette of Human Dicer. | eng_Latn | 4,748 |
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs | TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection | DLR-Hand II: next generation of a dextrous robot hand | eng_Latn | 4,749 |
A heuristic approach for detection of obfuscated malware | A semantics-based approach to malware detection | A framework of mobile transaction use : the user's perspective | eng_Latn | 4,750 |
Deobfuscation of Virtualization-Obfuscated Code Through Symbolic Execution and Compilation Optimization | Automatic Reverse Engineering of Malware Emulators | Sketch2normal: deep networks for normal map generation | eng_Latn | 4,751 |
TypeSan: Practical Type Confusion Detection | control - flow integrity . | Efficient software-based fault isolation | eng_Latn | 4,752 |
AEG: Automatic Exploit Generation | All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) | Scalable, Behavior-Based Malware Clustering | kor_Hang | 4,753 |
Deep Analysis of Binary Code to Recover Program Structure | BAP: A Binary Analysis Platform | Designing Business Models for the Internet of Things | kor_Hang | 4,754 |
Modelling Slotted-ALOHA Simulator Using Computational Spreadsheet Based e-Forms | The mole concept using MS Excel | Hardware-software integrated approaches to defend against software cache-based side channel attacks | kor_Hang | 4,755 |
Three control flow obfuscation methods for Java software | Manufacturing cheap, resilient, and stealthy opaque constructs | Software Structure Metrics Based on Information Flow | eng_Latn | 4,756 |
portable and efficient auto - vectorized bytecode : a look at the interaction between static and jit compilers . | Split Compilation: an Application to Just-in-Time Vectorization | Functions and mechanisms of epigenetic inheritance in animals | eng_Latn | 4,757 |
Annotated Control Flow Graph for Metamorphic Malware Detection | Dynamic malware detection using registers values set analysis | Obfuscation of executable code to improve resistance to static disassembly | eng_Latn | 4,758 |
defis de la securite de l ' information . support a la gestion des risques de securite par les modeles . | Using abuse case models for security requirements analysis | Defeating return-oriented rootkits with "Return-Less" kernels | fra_Latn | 4,759 |
learning physical dynamics . | terpret : a probabilistic programming language for program induction . | Virtual ghost: protecting applications from hostile operating systems | eng_Latn | 4,760 |
Hardware Trojan Detection by Multiple-Parameter Side-Channel Analysis | A Survey of Hardware Trojan Taxonomy and Detection | Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information | eng_Latn | 4,761 |
Identification of Refused Bequest Code Smells | design patterns : elements of reusable object - oriented software . | Precocious Puberty | eng_Latn | 4,762 |
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software | Address obfuscation: an efficient approach to combat a broad range of memory error exploits | CRITICAL SUCCESS FACTORS FOR DATA WAREHOUSING: A CLASSIC ANSWER TO A MODERN QUESTION | eng_Latn | 4,763 |
Extracting Conditional Formulas for Cross-Platform Bug Search | Leveraging semantic signatures for bug search in binary programs | Detecting bad smells in source code using change history information | eng_Latn | 4,764 |
Who Wrote This Code? Identifying the Authors of Program Binaries | Winnowing: local algorithms for document fingerprinting | SERT and NET occupancy by venlafaxine and milnacipran in nonhuman primates: a PET study | eng_Latn | 4,765 |
Logical Attacks on Secured Containers of the Java Card Platform | Developing a Trojan applets in a smart card | Video summarization: techniques and classification | eng_Latn | 4,766 |
Malware Analysis using Multiple API Sequence Mining Control Flow Graph | IMDS: intelligent malware detection system | The Influence of Carbon Dioxide on Brain Activity and Metabolism in Conscious Humans | eng_Latn | 4,767 |
Toward the efficient use of multiple explicitly managed memory subsystems | dynamic binary analysis and instrumentation . | The Emergence of Canalization and Evolvability in an Open-Ended, Interactive Evolutionary System | eng_Latn | 4,768 |
Security Analysis of PHP Bytecode Protection Mechanisms | Obfuscation of executable code to improve resistance to static disassembly | Do Energy Efficiency Investments Deliver at the Right Time | kor_Hang | 4,769 |
Architectural Data Flow Analysis | Challenges in Secure Software Evolution - The Role of Software Architecture | A New Calibration Method for Current and Voltage Sensors Used in Power Quality Measurements | kor_Hang | 4,770 |
A Survey of Prevention/Mitigation against Memory Corruption Attacks | AddressSanitizer : A Fast Address Sanity Checker | CLOPE: a fast and effective clustering algorithm for transactional data | eng_Latn | 4,771 |
Selecting a set of appropriate metrics for detecting code clones | Substring matching for clone detection and change tracking | RacerX: effective, static detection of race conditions and deadlocks | eng_Latn | 4,772 |
Probfuscation: An Obfuscation Approach Using Probabilistic Control Flows | Exploring Multiple Execution Paths for Malware Analysis | Automated classification and analysis of internet malware | kor_Hang | 4,773 |
Dynamic Malware Detection Using API Similarity | Malware Detection Using Dynamic Birthmarks | Neurofeedback for the treatment of schizophrenia: Case study | eng_Latn | 4,774 |
Detection of Metamorphic Malware based on HMM: A Hierarchical Approach | A tutorial on hidden Markov models and selected applications in speech recognition | Opcode graph similarity and metamorphic detection | eng_Latn | 4,775 |
Applying Memory Forensics to Rootkit Detection | Cloaker: Hardware Supported Rootkit Concealment | A Virtual Machine Introspection Based Architecture for Intrusion Detection | eng_Latn | 4,776 |
Andro-AutoPsy: Anti-malware system based on similarity matching of malware and malware creator-centric information | A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins | Predictors of physical restraint use in Canadian intensive care units | eng_Latn | 4,777 |
A malware detection system based on intermediate language | Polymorphic Malware Detection Using Sequence Classification Methods | Communication Needs of Elderly at Risk of Falls and their Remote Family | eng_Latn | 4,778 |
Transparent Runtime Shadow Stack: Protection against malicious return address modifications | A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention | A Multi-objective Framework for Location Recommendation Based on User Preference | eng_Latn | 4,779 |
Combining static and dynamic analysis for the detection of malicious documents | Toward Automated Dynamic Malware Analysis Using CWSandbox | A Semantic Model for Information Sharing in Autonomous Vehicle Systems | eng_Latn | 4,780 |
Generalized vulnerability extrapolation using abstract syntax trees | Pixy: a static analysis tool for detecting Web application vulnerabilities | Why is Speech Recognition Difficult? | eng_Latn | 4,781 |
An Eclipse plug-in for Test-to-Code Traceability Recovery | Program slicing: methods and applications | Applications of approximation algorithms to cooperative games | kor_Hang | 4,782 |
Graph-based malware detection using dynamic analysis | Learning and Classification of Malware Behavior | Inferring Cognitive Models from Data using Approximate Bayesian Computation | eng_Latn | 4,783 |
Design and Implementation of SecPod, A Framework for Virtualization-Based Security Systems | ATRA: Address Translation Redirection Attack against Hardware-based External Monitors | Similarity in Semantic Graphs: Combining Structural, Literal, and Ontology-based Measures | eng_Latn | 4,784 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis | Design Study Methodology: Reflections from the Trenches and the Stacks | EEG theta/beta ratio in relation to fear-modulated response-inhibition, attentional control, and affective traits | eng_Latn | 4,785 |
Dynamically Translating x86 to LLVM using QEMU | Selective Symbolic Execution | Automated Whitebox Fuzz Testing | eng_Latn | 4,786 |
Improving malware detection time by using RLE and N-gram | Approximate graph edit distance computation by means of bipartite graph matching | An analytical model for predicting the remaining battery capacity of lithium-ion batteries | eng_Latn | 4,787 |
The power of the dinur-nissim algorithm: breaking privacy of statistical and graph databases | Privacy Preserving Data Mining | An efficient and generic reversible debugger using the virtual machine based approach | eng_Latn | 4,788 |
A case study on the relationship between code ownership and refactoring activities in a Java software system | Template-based reconstruction of complex refactorings | Simulation of ion implantation for CMOS 1µm using SILVACO tools | eng_Latn | 4,789 |
First-Order Bayesian Logic | A Language and Program for Complex Bayesian Modelling | K-Tracer: A System for Extracting Kernel Malware Behavior | kor_Hang | 4,790 |
A Knowledge-Assisted Visual Malware Analysis System: Design, Validation, and Reflection of KAMAS | about face 3 : the essentials of interaction design . | Engineered nanomaterials for water treatment and remediation: Costs, benefits, and applicability | kor_Hang | 4,791 |
Who Wrote This Code? Identifying the Authors of Program Binaries | Malware phylogeny generation using permutations of code | Efficient randomized pattern-matching algorithms | eng_Latn | 4,792 |
Ensuring operating system kernel integrity with OSck | Non-control-data attacks are realistic threats | A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors | eng_Latn | 4,793 |
ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS | Graph-based anomaly detection | A Comparison of Static Analysis Tools for Vulnerability Detection in C / C + + Code | yue_Hant | 4,794 |
APISan: Sanitizing {API} Usages through Semantic Cross-Checking | Automatic Inference of Search Patterns for Taint-Style Vulnerabilities | 2Vrms 16Ω switching headphone driver with 82% peak efficiency, 102 dB SNDR and 1.1mA/channel quiescent current | eng_Latn | 4,795 |
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations | BitBlaze: A new approach to computer security via binary analysis | Advanced Compiler Design and Implementation | kor_Hang | 4,796 |
On the Feasibility of Malware Authorship Attribution | refactoring improving the design of existing code . | Image Completion Approaches Using the Statistics of Similar Patches | eng_Latn | 4,797 |
RainbowNet : Color Extrapolation from Grayscale Images | Colorful Image Colorization | dynamic software birthmarks to detect the theft of windows applications . | eng_Latn | 4,798 |
CPAchecker: A Tool for Configurable Software Verification | The SLAM project: debugging system software via static analysis | The Distributed Nature of Working Memory | eng_Latn | 4,799 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.