Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
A general path-based representation for predicting program properties
|
Predicting Program Properties from "Big Code"
|
A parameter-free hedging algorithm
|
eng_Latn
| 4,800 |
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
|
A heuristic approach for detection of obfuscated malware
|
Behavioral detection of malware: from a survey towards an established taxonomy
|
eng_Latn
| 4,801 |
Geographic proximity to coal plants and U.S. public support for extending the Production Tax Credit
|
Media framing and public attitudes toward biofuels.
|
HEMD: a highly efficient random forest-based malware detection framework for Android
|
eng_Latn
| 4,802 |
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
|
Jump-oriented programming: a new class of code-reuse attack
|
GraphIE: A Graph-Based Framework for Information Extraction
|
kor_Hang
| 4,803 |
Building Decision Tree Classifier on Private Data
|
how to play any mental game or a completeness theorem for protocols with honest majority .
|
SMM Rootkits: A New Breed of OS Independent Malware
|
eng_Latn
| 4,804 |
Malware Lineage in the Wild
|
Rendezvous: A search engine for binary code
|
Combining symbolic execution with model checking to verify parallel numerical programs
|
eng_Latn
| 4,805 |
Ransomware: A Rising Threat of new age Digital Extortion
|
Comparative analysis of various ransomware virii
|
optimizations for embedded systems and FFT
|
eng_Latn
| 4,806 |
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
|
control flow integrity for cots binaries .
|
Aligned Image-Word Representations Improve Inductive Transfer Across Vision-Language Tasks
|
eng_Latn
| 4,807 |
Clustering and visualization of mobile application permissions for end users and malware analysts
|
Evolution, Detection and Analysis of Malware for Smart Devices
|
3D Robot Pose Estimation from 2D Images
|
eng_Latn
| 4,808 |
ASN: A Dynamic Barrier-Based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs
|
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
|
Pin: building customized program analysis tools with dynamic instrumentation
|
eng_Latn
| 4,809 |
A Taint Based Approach for Smart Fuzzing
|
An Empirical Study of the Reliability of UNIX Utilities
|
A Robot Operating System (ROS) based humanoid robot control
|
eng_Latn
| 4,810 |
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
|
Secure virtual architecture: a safe execution environment for commodity operating systems
|
Reviewing the Concept of Brand Equity and Evaluating Consumer-Based Brand Equity (CBBE) Models
|
kor_Hang
| 4,811 |
Android Root and its Providers: A Double-Edged Sword
|
Obfuscation resilient binary code reuse through trace-oriented programming
|
Acetabular fractures: what radiologists should know and how 3D CT can aid classification.
|
eng_Latn
| 4,812 |
What can N-grams learn for malware detection?
|
A scalable multi-level feature extraction technique to detect malicious executables
|
A comparison of index-based lempel-Ziv LZ77 factorization algorithms
|
eng_Latn
| 4,813 |
Malware detection using adaptive data compression
|
Deobfuscation: reverse engineering obfuscated code
|
HER2 in Breast Cancer Stemness: A Negative Feedback Loop towards Trastuzumab Resistance
|
eng_Latn
| 4,814 |
Differentiating malware from cleanware using behavioural analysis
|
Limits of Static Analysis for Malware Detection
|
A Review and Meta-Analysis of Age-Based Stereotype Threat: Negative Stereotypes, Not Facts, Do the Damage
|
eng_Latn
| 4,815 |
On the Relation between External Software Quality and Static Code Analysis
|
If your bug database could talk
|
Towards a metrics suite for object oriented design
|
eng_Latn
| 4,816 |
CASPER: Compiler-Assisted Securing of Programs at Runtime
|
StackGhost: Hardware Facilitated Stack Protection
|
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
|
eng_Latn
| 4,817 |
An effective approach for classification of advanced malware with high accuracy
|
CODE OBFUSCATION AND VIRUS DETECTION
|
A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications
|
eng_Latn
| 4,818 |
Architectural Support for Software-Defined Metadata Processing
|
Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection
|
Issues Concerning Integration of Unmanned Aerial Vehicles in Civil Airspace November 2004
|
eng_Latn
| 4,819 |
dowsing for overflows : a guided fuzzer to find buffer boundary violations .
|
LLVM: a compilation framework for lifelong program analysis & transformation
|
Word lengths are optimized for efficient communication
|
eng_Latn
| 4,820 |
Shift-Reduce CCG Parsing
|
Perceptron Reranking for CCG Realization
|
A hybrid symbolic execution assisted fuzzing method
|
eng_Latn
| 4,821 |
A case study on the relationship between code ownership and refactoring activities in a Java software system
|
Assert Use in GitHub Projects
|
A future-adaptable password scheme
|
eng_Latn
| 4,822 |
Security Analysis of the edX Platform
|
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
|
Holding intruders accountable on the Internet
|
eng_Latn
| 4,823 |
A source code linearization technique for detecting plagiarized programs
|
Clone detection using abstract syntax trees
|
Social Categorization and the Perception of Groups and Group Differences
|
eng_Latn
| 4,824 |
A comparison of static, dynamic, and hybrid analysis for malware detection
|
Graph-based malware detection using dynamic analysis
|
Planning Formalisms and Authoring in Interactive Storytelling
|
eng_Latn
| 4,825 |
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
|
Confidentiality issues on a GPU in a virtualized environment
|
Obfuscation resilient binary code reuse through trace-oriented programming
|
kor_Hang
| 4,826 |
Automatic Testing of Program Security Vulnerabilities
|
Automatic creation of SQL Injection and cross-site scripting attacks
|
Introduction to automata theory, languages, and computation, 2nd edition
|
eng_Latn
| 4,827 |
Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding
|
Deobfuscation: reverse engineering obfuscated code
|
Fashion Style in 128 Floats: Joint Ranking and Classification Using Weak Data for Feature Extraction
|
eng_Latn
| 4,828 |
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
|
Secure virtual architecture: a safe execution environment for commodity operating systems
|
Secure program execution via dynamic information flow tracking
|
kor_Hang
| 4,829 |
Evolution of evasive malwares: A survey
|
Barecloud: bare-metal analysis-based evasive malware detection
|
Index Modulation for 5G: Striving to Do More with Less
|
eng_Latn
| 4,830 |
Regular property guided dynamic symbolic execution
|
Symbolic PathFinder: symbolic execution of Java bytecode
|
Image Deblurring with Blurred / Noisy Image Pairs
|
eng_Latn
| 4,831 |
A malware instruction set for behavior-based analysis
|
Scalable, Behavior-Based Malware Clustering
|
Control and Operation of a DC Microgrid With Variable Generation and Energy Storage
|
eng_Latn
| 4,832 |
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code
|
Defeating return-oriented rootkits with "Return-Less" kernels
|
a survey of dimension reduction methods for high - dimensional data analysis and visualization .
|
eng_Latn
| 4,833 |
FlexVec: auto-vectorization for irregular loops
|
Pin: building customized program analysis tools with dynamic instrumentation
|
Linear scan register allocation
|
eng_Latn
| 4,834 |
towards practical taint tracking .
|
Tainting is not pointless
|
Correction of True Hanging Columella Using Medial Crural Tuck-Up Technique
|
eng_Latn
| 4,835 |
Efficient GPU Screen-Space Ray Tracing
|
Fast Global Illumination Approximations on Deep G-Buffers
|
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
|
eng_Latn
| 4,836 |
On-demand transparency for improving hardware Trojan detectability
|
Trojan Detection using IC Fingerprinting
|
Electromagnetic Analysis: Concrete Results
|
eng_Latn
| 4,837 |
CoGENT: Verifying High-Assurance File System Implementations
|
seL4: formal verification of an OS kernel
|
CIL: Intermediate language and tools for analysis and transformation of C programs
|
eng_Latn
| 4,838 |
The static analysis of WannaCry ransomware
|
Dridex: Analysis of the traffic and automatic generation of IOCs
|
What-If Reasoning with Counterfactual Gaussian Processes
|
eng_Latn
| 4,839 |
malware detection using integrated static and dynamic analysis .
|
Limits of Static Analysis for Malware Detection
|
Why Interventions to Influence Adolescent Behavior Often Fail but Could Succeed
|
eng_Latn
| 4,840 |
Development of dynamic protection against timing channels
|
A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repair
|
Incorporating Advice into Neuroevolution of Adaptive Agents
|
eng_Latn
| 4,841 |
The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models
|
Software metrics: roadmap
|
Model-based Analysis of ChIP-Seq (MACS)
|
eng_Latn
| 4,842 |
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
|
BitBlaze: A new approach to computer security via binary analysis
|
BitScope: Automatically dissecting malicious binaries
|
eng_Latn
| 4,843 |
Virtual ghost: protecting applications from hostile operating systems
|
Implementing an untrusted operating system on trusted hardware
|
Biodiversity and Ecosystem Functioning : Maintaining Natural Life Support Processes SUMMARY
|
eng_Latn
| 4,844 |
Rozzle: De-cloaking Internet Malware
|
Automated Whitebox Fuzz Testing
|
A general framework for never-ending learning from time series streams
|
eng_Latn
| 4,845 |
SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology
|
A Survey of Malware Detection Techniques
|
Merging event logs for process mining: A rule based merging method and rule suggestion algorithm
|
eng_Latn
| 4,846 |
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
|
A high efficiency Hardware Trojan detection technique based on fast SEM imaging
|
Understanding Sustained Participation in Open Source Software Projects
|
kor_Hang
| 4,847 |
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences
|
Finding Plagiarisms among a Set of Programs with JPlag
|
Flow and Regulatory Compatibility: An Experimental Approach to the Flow Model of Intrinsic Motivation
|
eng_Latn
| 4,848 |
SCRAP: Architecture for signature-based protection from Code Reuse Attacks
|
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
|
Content Adaptive Enhancement of Multi-View Depth Maps for Free Viewpoint Video
|
eng_Latn
| 4,849 |
Validation and verification of computer forensic software tools d Searching Function
|
Digital forensics: exploring validation, verification & certification
|
Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers
|
eng_Latn
| 4,850 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
|
A survey on automated dynamic malware-analysis techniques and tools
|
Human Action Recognition Using Improved Salient Dense Trajectories
|
eng_Latn
| 4,851 |
A Robust Method for Prevention of Second Order and Stored Procedure based SQL Injections
|
Static detection of security vulnerabilities in scripting languages
|
Beyond Geometric Path Planning: Learning Context-Driven Trajectory Preferences via Sub-optimal Feedback
|
eng_Latn
| 4,852 |
cork : dynamic memory leak detection for java .
|
Visualizing reference patterns for solving memory leaks in Java
|
Web application security vulnerabilities detection approaches: A systematic mapping study
|
eng_Latn
| 4,853 |
CP-Miner: finding copy-paste and related bugs in large-scale software code
|
CCFinder: a multilinguistic token-based code clone detection system for large scale source code
|
midline cleft lip and bifid nose deformity : description , classification , and treatment .
|
eng_Latn
| 4,854 |
Detecting source code similarity using code abstraction
|
Introduction to Algorithms, 3rd Edition
|
web application firewall - dot defender .
|
eng_Latn
| 4,855 |
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification
|
AEG: Automatic Exploit Generation
|
Accuracy of electronic apex locators to detect root canal perforations with inserted metallic posts: an ex vivo study
|
eng_Latn
| 4,856 |
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution
|
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
|
Pseudo-Random Number Generators for Massively Parallel Discrete-Event Simulation
|
eng_Latn
| 4,857 |
Comparing Different Moving Target Defense Techniques
|
N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION
|
graph computation for machine learning .
|
eng_Latn
| 4,858 |
cp - miner : a tool for finding copy - paste and related bugs in operating system code .
|
CCured in the real world
|
Pattern matching for clone and concept detection
|
eng_Latn
| 4,859 |
AccessMiner: using system-centric models for malware protection
|
A Layered Architecture for Detecting Malicious Behaviors
|
SVO: Fast semi-direct monocular visual odometry
|
eng_Latn
| 4,860 |
Proposal Techniques and Solutions for Addressing Ransomware Attacks
|
Toward Automated Dynamic Malware Analysis Using CWSandbox
|
Influence modeling in behavioral data
|
eng_Latn
| 4,861 |
Malware and Machine Learning
|
A malware instruction set for behavior-based analysis
|
Eureka: A Framework for Enabling Static Malware Analysis
|
eng_Latn
| 4,862 |
Automatic vulnerability mining with abstract interpretation and static taint trace
|
Taint-based directed whitebox fuzzing
|
Automatic Network Protocol Analysis
|
eng_Latn
| 4,863 |
Ariadne: A Minimal Approach to State Continuity.
|
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
|
Situation assessment algorithm for a collision prevention assistant
|
kor_Hang
| 4,864 |
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
|
Efficient software-based fault isolation
|
Magnetic Fields and Forces in Permanent Magnet Levitated Bearings
|
eng_Latn
| 4,865 |
Toward sensitive document release with privacy guarantees
|
Privacy-preserving data publishing: A survey of recent developments
|
efficient on - the - fly data race detection in multihreaded c + + programs .
|
eng_Latn
| 4,866 |
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
|
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
|
Shape reconstruction from gradient data
|
eng_Latn
| 4,867 |
Automatic Heavy-weight Static Analysis Tools for Fin- ding Bugs in Safety-critical Embedded C/C++ Code
|
An overview on the Static Code Analysis approach in Software Development
|
Web-CAT: automatically grading programming assignments
|
eng_Latn
| 4,868 |
Embedded Devices Security and Firmware Reverse Engineering BH 13 US Workshop
|
Firmware modification attacks on programmable logic controllers
|
afrl - osr - va - tr - 2013 - 0439 autonomic recovery : hypercheck : a hardware - assisted integrity monitor .
|
eng_Latn
| 4,869 |
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware
|
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
|
Management of pediatric corneal limbal dermoids
|
eng_Latn
| 4,870 |
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study
|
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
|
TARP: ticket-based address resolution protocol
|
eng_Latn
| 4,871 |
SAGE: whitebox fuzzing for security testing
|
Automated Whitebox Fuzz Testing
|
Consumer perceptions of product packaging
|
eng_Latn
| 4,872 |
Distributed Packet Inspection By Using PIL-2 Language
|
BPF+: exploiting global data-flow optimization in a generalized packet filter architecture
|
Advanced persistent threats: Behind the scenes
|
eng_Latn
| 4,873 |
Dynamic vs. Static Flow-Sensitive Security Analysis
|
Civitas: Toward a Secure Voting System
|
N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION
|
kor_Hang
| 4,874 |
Network-level polymorphic shellcode detection using emulation
|
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
|
Linear pattern matching algorithms
|
eng_Latn
| 4,875 |
A Real-Time Audit Mechanism Based on the Compression Technique
|
Principles of Analytic Monitoring for Continuous Assurance
|
Archimetrix: Improved Software Architecture Recovery in the Presence of Design Deficiencies
|
eng_Latn
| 4,876 |
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
|
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting
|
Analyzing Memory Accesses in x86 Executables
|
eng_Latn
| 4,877 |
Behave or be watched: debugging with behavioral watchpoints
|
How to shadow every byte of memory used by a program
|
Neural Circuitry of Wakefulness and Sleep
|
eng_Latn
| 4,878 |
Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware
|
Peer-to-Peer Botnets: Overview and Case Study
|
A formally verified compiler for Lustre
|
eng_Latn
| 4,879 |
Malware detection using assembly code and control flow graph optimization
|
Automated classification and analysis of internet malware
|
Periorbital necrobiosis lipoidica diabeticorum: case report
|
eng_Latn
| 4,880 |
Static detection of security vulnerabilities in scripting languages
|
Flow-sensitive type qualifiers
|
Video games and spatial cognition.
|
eng_Latn
| 4,881 |
A survey on server-side approaches to securing web applications
|
Static detection of security vulnerabilities in scripting languages
|
Identification and functional analysis of gene cluster involvement in biosynthesis of the cyclic lipopeptide antibiotic pelgipeptin produced by Paenibacillus elgii
|
eng_Latn
| 4,882 |
Automatic Deobfuscation and Reverse Engineering of Obfuscated Code
|
Return-oriented programming without returns
|
Terminological Obfuscation in Online Research
|
eng_Latn
| 4,883 |
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
|
An Empirical Study of the Reliability of UNIX Utilities
|
Distributed REScala: an update algorithm for distributed reactive programming
|
eng_Latn
| 4,884 |
Behavior based software theft detection
|
Valgrind: a framework for heavyweight dynamic binary instrumentation
|
Fast Ant Colony Optimization for Clustering
|
eng_Latn
| 4,885 |
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory
|
Automated memory leak detection for production use
|
Valgrind: A Program Supervision Framework
|
yue_Hant
| 4,886 |
The future of grey-box fuzzing
|
BitBlaze: A new approach to computer security via binary analysis
|
Diapause in phytoseiid mites: a review
|
eng_Latn
| 4,887 |
Comparing Quality Metrics for Cloned and Non Cloned Java Methods: A Large Scale Empirical Study
|
Substring matching for clone detection and change tracking
|
PCB pad design for board to board SMP connector
|
eng_Latn
| 4,888 |
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks
|
ProB: an automated analysis toolset for the B method
|
Application of CRISPR/Cas9 in plant biology
|
eng_Latn
| 4,889 |
LAVA: Large-Scale Automated Vulnerability Addition
|
Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools
|
Review of the Satisfaction with Life Scale
|
yue_Hant
| 4,890 |
LKIM : The Linux Kernel Integrity
|
Linux kernel integrity measurement using contextual inspection
|
Towards operationalizingcomplexity leadership:How generative, administrativeand community-buildingleadership practices enactorganizational outcomes
|
eng_Latn
| 4,891 |
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
|
Building diverse computer systems
|
Environmental Impact of Organic Agriculture
|
eng_Latn
| 4,892 |
Automatic and scalable fault detection for mobile applications
|
A grey-box approach for automated GUI-model generation of mobile applications
|
Object Ordering with Bidirectional Matchings for Visual Reasoning
|
eng_Latn
| 4,893 |
Learn&Fuzz: Machine learning for input fuzzing
|
Automated testing of refactoring engines
|
Analyzing Memory Accesses in x86 Executables
|
eng_Latn
| 4,894 |
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity
|
HAFIX: Hardware-Assisted Flow Integrity eXtension
|
Multi-Objective Search Results Clustering
|
eng_Latn
| 4,895 |
Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware !
|
Exploring Multiple Execution Paths for Malware Analysis
|
A weakly informative default prior distribution for logistic and other regression models
|
eng_Latn
| 4,896 |
A Large-Scale Empirical Study of Security Patches
|
An empirical study on real bug fixes
|
Low-cost Autonomous Navigation System Based on Optical Flow Classification
|
kor_Hang
| 4,897 |
Active refocusing of images and videos
|
Shape from Focus
|
An empirical model to predict security vulnerabilities using code complexity metrics
|
eng_Latn
| 4,898 |
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity
|
Interpreter Exploitation
|
Using Deep Learning and Google Street View to Estimate the De- mographic Makeup of the US
|
eng_Latn
| 4,899 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.