Search is not available for this dataset
query
stringlengths
1
13.4k
pos
stringlengths
1
61k
neg
stringlengths
1
63.9k
query_lang
stringclasses
147 values
__index_level_0__
int64
0
3.11M
A general path-based representation for predicting program properties
Predicting Program Properties from "Big Code"
A parameter-free hedging algorithm
eng_Latn
4,800
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis?
A heuristic approach for detection of obfuscated malware
Behavioral detection of malware: from a survey towards an established taxonomy
eng_Latn
4,801
Geographic proximity to coal plants and U.S. public support for extending the Production Tax Credit
Media framing and public attitudes toward biofuels.
HEMD: a highly efficient random forest-based malware detection framework for Android
eng_Latn
4,802
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks
Jump-oriented programming: a new class of code-reuse attack
GraphIE: A Graph-Based Framework for Information Extraction
kor_Hang
4,803
Building Decision Tree Classifier on Private Data
how to play any mental game or a completeness theorem for protocols with honest majority .
SMM Rootkits: A New Breed of OS Independent Malware
eng_Latn
4,804
Malware Lineage in the Wild
Rendezvous: A search engine for binary code
Combining symbolic execution with model checking to verify parallel numerical programs
eng_Latn
4,805
Ransomware: A Rising Threat of new age Digital Extortion
Comparative analysis of various ransomware virii
optimizations for embedded systems and FFT
eng_Latn
4,806
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels
control flow integrity for cots binaries .
Aligned Image-Word Representations Improve Inductive Transfer Across Vision-Language Tasks
eng_Latn
4,807
Clustering and visualization of mobile application permissions for end users and malware analysts
Evolution, Detection and Analysis of Malware for Smart Devices
3D Robot Pose Estimation from 2D Images
eng_Latn
4,808
ASN: A Dynamic Barrier-Based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
Pin: building customized program analysis tools with dynamic instrumentation
eng_Latn
4,809
A Taint Based Approach for Smart Fuzzing
An Empirical Study of the Reliability of UNIX Utilities
A Robot Operating System (ROS) based humanoid robot control
eng_Latn
4,810
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
Secure virtual architecture: a safe execution environment for commodity operating systems
Reviewing the Concept of Brand Equity and Evaluating Consumer-Based Brand Equity (CBBE) Models
kor_Hang
4,811
Android Root and its Providers: A Double-Edged Sword
Obfuscation resilient binary code reuse through trace-oriented programming
Acetabular fractures: what radiologists should know and how 3D CT can aid classification.
eng_Latn
4,812
What can N-grams learn for malware detection?
A scalable multi-level feature extraction technique to detect malicious executables
A comparison of index-based lempel-Ziv LZ77 factorization algorithms
eng_Latn
4,813
Malware detection using adaptive data compression
Deobfuscation: reverse engineering obfuscated code
HER2 in Breast Cancer Stemness: A Negative Feedback Loop towards Trastuzumab Resistance
eng_Latn
4,814
Differentiating malware from cleanware using behavioural analysis
Limits of Static Analysis for Malware Detection
A Review and Meta-Analysis of Age-Based Stereotype Threat: Negative Stereotypes, Not Facts, Do the Damage
eng_Latn
4,815
On the Relation between External Software Quality and Static Code Analysis
If your bug database could talk
Towards a metrics suite for object oriented design
eng_Latn
4,816
CASPER: Compiler-Assisted Securing of Programs at Runtime
StackGhost: Hardware Facilitated Stack Protection
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
eng_Latn
4,817
An effective approach for classification of advanced malware with high accuracy
CODE OBFUSCATION AND VIRUS DETECTION
A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications
eng_Latn
4,818
Architectural Support for Software-Defined Metadata Processing
Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection
Issues Concerning Integration of Unmanned Aerial Vehicles in Civil Airspace November 2004
eng_Latn
4,819
dowsing for overflows : a guided fuzzer to find buffer boundary violations .
LLVM: a compilation framework for lifelong program analysis & transformation
Word lengths are optimized for efficient communication
eng_Latn
4,820
Shift-Reduce CCG Parsing
Perceptron Reranking for CCG Realization
A hybrid symbolic execution assisted fuzzing method
eng_Latn
4,821
A case study on the relationship between code ownership and refactoring activities in a Java software system
Assert Use in GitHub Projects
A future-adaptable password scheme
eng_Latn
4,822
Security Analysis of the edX Platform
When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries
Holding intruders accountable on the Internet
eng_Latn
4,823
A source code linearization technique for detecting plagiarized programs
Clone detection using abstract syntax trees
Social Categorization and the Perception of Groups and Group Differences
eng_Latn
4,824
A comparison of static, dynamic, and hybrid analysis for malware detection
Graph-based malware detection using dynamic analysis
Planning Formalisms and Authoring in Interactive Storytelling
eng_Latn
4,825
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU
Confidentiality issues on a GPU in a virtualized environment
Obfuscation resilient binary code reuse through trace-oriented programming
kor_Hang
4,826
Automatic Testing of Program Security Vulnerabilities
Automatic creation of SQL Injection and cross-site scripting attacks
Introduction to automata theory, languages, and computation, 2nd edition
eng_Latn
4,827
Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding
Deobfuscation: reverse engineering obfuscated code
Fashion Style in 128 Floats: Joint Ranking and Classification Using Weak Data for Feature Extraction
eng_Latn
4,828
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
Secure virtual architecture: a safe execution environment for commodity operating systems
Secure program execution via dynamic information flow tracking
kor_Hang
4,829
Evolution of evasive malwares: A survey
Barecloud: bare-metal analysis-based evasive malware detection
Index Modulation for 5G: Striving to Do More with Less
eng_Latn
4,830
Regular property guided dynamic symbolic execution
Symbolic PathFinder: symbolic execution of Java bytecode
Image Deblurring with Blurred / Noisy Image Pairs
eng_Latn
4,831
A malware instruction set for behavior-based analysis
Scalable, Behavior-Based Malware Clustering
Control and Operation of a DC Microgrid With Variable Generation and Energy Storage
eng_Latn
4,832
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code
Defeating return-oriented rootkits with "Return-Less" kernels
a survey of dimension reduction methods for high - dimensional data analysis and visualization .
eng_Latn
4,833
FlexVec: auto-vectorization for irregular loops
Pin: building customized program analysis tools with dynamic instrumentation
Linear scan register allocation
eng_Latn
4,834
towards practical taint tracking .
Tainting is not pointless
Correction of True Hanging Columella Using Medial Crural Tuck-Up Technique
eng_Latn
4,835
Efficient GPU Screen-Space Ray Tracing
Fast Global Illumination Approximations on Deep G-Buffers
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints
eng_Latn
4,836
On-demand transparency for improving hardware Trojan detectability
Trojan Detection using IC Fingerprinting
Electromagnetic Analysis: Concrete Results
eng_Latn
4,837
CoGENT: Verifying High-Assurance File System Implementations
seL4: formal verification of an OS kernel
CIL: Intermediate language and tools for analysis and transformation of C programs
eng_Latn
4,838
The static analysis of WannaCry ransomware
Dridex: Analysis of the traffic and automatic generation of IOCs
What-If Reasoning with Counterfactual Gaussian Processes
eng_Latn
4,839
malware detection using integrated static and dynamic analysis .
Limits of Static Analysis for Malware Detection
Why Interventions to Influence Adolescent Behavior Often Fail but Could Succeed
eng_Latn
4,840
Development of dynamic protection against timing channels
A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repair
Incorporating Advice into Neuroevolution of Adaptive Agents
eng_Latn
4,841
The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models
Software metrics: roadmap
Model-based Analysis of ChIP-Seq (MACS)
eng_Latn
4,842
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs
BitBlaze: A new approach to computer security via binary analysis
BitScope: Automatically dissecting malicious binaries
eng_Latn
4,843
Virtual ghost: protecting applications from hostile operating systems
Implementing an untrusted operating system on trusted hardware
Biodiversity and Ecosystem Functioning : Maintaining Natural Life Support Processes SUMMARY
eng_Latn
4,844
Rozzle: De-cloaking Internet Malware
Automated Whitebox Fuzz Testing
A general framework for never-ending learning from time series streams
eng_Latn
4,845
SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology
A Survey of Malware Detection Techniques
Merging event logs for process mining: A rule based merging method and rule suggestion algorithm
eng_Latn
4,846
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy
A high efficiency Hardware Trojan detection technique based on fast SEM imaging
Understanding Sustained Participation in Open Source Software Projects
kor_Hang
4,847
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences
Finding Plagiarisms among a Set of Programs with JPlag
Flow and Regulatory Compatibility: An Experimental Approach to the Flow Model of Intrinsic Motivation
eng_Latn
4,848
SCRAP: Architecture for signature-based protection from Code Reuse Attacks
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
Content Adaptive Enhancement of Multi-View Depth Maps for Free Viewpoint Video
eng_Latn
4,849
Validation and verification of computer forensic software tools d Searching Function
Digital forensics: exploring validation, verification & certification
Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers
eng_Latn
4,850
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis
A survey on automated dynamic malware-analysis techniques and tools
Human Action Recognition Using Improved Salient Dense Trajectories
eng_Latn
4,851
A Robust Method for Prevention of Second Order and Stored Procedure based SQL Injections
Static detection of security vulnerabilities in scripting languages
Beyond Geometric Path Planning: Learning Context-Driven Trajectory Preferences via Sub-optimal Feedback
eng_Latn
4,852
cork : dynamic memory leak detection for java .
Visualizing reference patterns for solving memory leaks in Java
Web application security vulnerabilities detection approaches: A systematic mapping study
eng_Latn
4,853
CP-Miner: finding copy-paste and related bugs in large-scale software code
CCFinder: a multilinguistic token-based code clone detection system for large scale source code
midline cleft lip and bifid nose deformity : description , classification , and treatment .
eng_Latn
4,854
Detecting source code similarity using code abstraction
Introduction to Algorithms, 3rd Edition
web application firewall - dot defender .
eng_Latn
4,855
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification
AEG: Automatic Exploit Generation
Accuracy of electronic apex locators to detect root canal perforations with inserted metallic posts: an ex vivo study
eng_Latn
4,856
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution
Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Pseudo-Random Number Generators for Massively Parallel Discrete-Event Simulation
eng_Latn
4,857
Comparing Different Moving Target Defense Techniques
N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION
graph computation for machine learning .
eng_Latn
4,858
cp - miner : a tool for finding copy - paste and related bugs in operating system code .
CCured in the real world
Pattern matching for clone and concept detection
eng_Latn
4,859
AccessMiner: using system-centric models for malware protection
A Layered Architecture for Detecting Malicious Behaviors
SVO: Fast semi-direct monocular visual odometry
eng_Latn
4,860
Proposal Techniques and Solutions for Addressing Ransomware Attacks
Toward Automated Dynamic Malware Analysis Using CWSandbox
Influence modeling in behavioral data
eng_Latn
4,861
Malware and Machine Learning
A malware instruction set for behavior-based analysis
Eureka: A Framework for Enabling Static Malware Analysis
eng_Latn
4,862
Automatic vulnerability mining with abstract interpretation and static taint trace
Taint-based directed whitebox fuzzing
Automatic Network Protocol Analysis
eng_Latn
4,863
Ariadne: A Minimal Approach to State Continuity.
Sanctum: Minimal Hardware Extensions for Strong Software Isolation
Situation assessment algorithm for a collision prevention assistant
kor_Hang
4,864
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine
Efficient software-based fault isolation
Magnetic Fields and Forces in Permanent Magnet Levitated Bearings
eng_Latn
4,865
Toward sensitive document release with privacy guarantees
Privacy-preserving data publishing: A survey of recent developments
efficient on - the - fly data race detection in multihreaded c + + programs .
eng_Latn
4,866
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild.
Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities
Shape reconstruction from gradient data
eng_Latn
4,867
Automatic Heavy-weight Static Analysis Tools for Fin- ding Bugs in Safety-critical Embedded C/C++ Code
An overview on the Static Code Analysis approach in Software Development
Web-CAT: automatically grading programming assignments
eng_Latn
4,868
Embedded Devices Security and Firmware Reverse Engineering BH 13 US Workshop
Firmware modification attacks on programmable logic controllers
afrl - osr - va - tr - 2013 - 0439 autonomic recovery : hypercheck : a hardware - assisted integrity monitor .
eng_Latn
4,869
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware
Automatic Inference of Search Patterns for Taint-Style Vulnerabilities
Management of pediatric corneal limbal dermoids
eng_Latn
4,870
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study
Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces
TARP: ticket-based address resolution protocol
eng_Latn
4,871
SAGE: whitebox fuzzing for security testing
Automated Whitebox Fuzz Testing
Consumer perceptions of product packaging
eng_Latn
4,872
Distributed Packet Inspection By Using PIL-2 Language
BPF+: exploiting global data-flow optimization in a generalized packet filter architecture
Advanced persistent threats: Behind the scenes
eng_Latn
4,873
Dynamic vs. Static Flow-Sensitive Security Analysis
Civitas: Toward a Secure Voting System
N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION
kor_Hang
4,874
Network-level polymorphic shellcode detection using emulation
Address obfuscation: an efficient approach to combat a broad range of memory error exploits
Linear pattern matching algorithms
eng_Latn
4,875
A Real-Time Audit Mechanism Based on the Compression Technique
Principles of Analytic Monitoring for Continuous Assurance
Archimetrix: Improved Software Architecture Recovery in the Presence of Design Deficiencies
eng_Latn
4,876
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
Penumbra: automatically identifying failure-relevant inputs using dynamic tainting
Analyzing Memory Accesses in x86 Executables
eng_Latn
4,877
Behave or be watched: debugging with behavioral watchpoints
How to shadow every byte of memory used by a program
Neural Circuitry of Wakefulness and Sleep
eng_Latn
4,878
Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware
Peer-to-Peer Botnets: Overview and Case Study
A formally verified compiler for Lustre
eng_Latn
4,879
Malware detection using assembly code and control flow graph optimization
Automated classification and analysis of internet malware
Periorbital necrobiosis lipoidica diabeticorum: case report
eng_Latn
4,880
Static detection of security vulnerabilities in scripting languages
Flow-sensitive type qualifiers
Video games and spatial cognition.
eng_Latn
4,881
A survey on server-side approaches to securing web applications
Static detection of security vulnerabilities in scripting languages
Identification and functional analysis of gene cluster involvement in biosynthesis of the cyclic lipopeptide antibiotic pelgipeptin produced by Paenibacillus elgii
eng_Latn
4,882
Automatic Deobfuscation and Reverse Engineering of Obfuscated Code
Return-oriented programming without returns
Terminological Obfuscation in Online Research
eng_Latn
4,883
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
An Empirical Study of the Reliability of UNIX Utilities
Distributed REScala: an update algorithm for distributed reactive programming
eng_Latn
4,884
Behavior based software theft detection
Valgrind: a framework for heavyweight dynamic binary instrumentation
Fast Ant Colony Optimization for Clustering
eng_Latn
4,885
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory
Automated memory leak detection for production use
Valgrind: A Program Supervision Framework
yue_Hant
4,886
The future of grey-box fuzzing
BitBlaze: A new approach to computer security via binary analysis
Diapause in phytoseiid mites: a review
eng_Latn
4,887
Comparing Quality Metrics for Cloned and Non Cloned Java Methods: A Large Scale Empirical Study
Substring matching for clone detection and change tracking
PCB pad design for board to board SMP connector
eng_Latn
4,888
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks
ProB: an automated analysis toolset for the B method
Application of CRISPR/Cas9 in plant biology
eng_Latn
4,889
LAVA: Large-Scale Automated Vulnerability Addition
Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools
Review of the Satisfaction with Life Scale
yue_Hant
4,890
LKIM : The Linux Kernel Integrity
Linux kernel integrity measurement using contextual inspection
Towards operationalizingcomplexity leadership:How generative, administrativeand community-buildingleadership practices enactorganizational outcomes
eng_Latn
4,891
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software
Building diverse computer systems
Environmental Impact of Organic Agriculture
eng_Latn
4,892
Automatic and scalable fault detection for mobile applications
A grey-box approach for automated GUI-model generation of mobile applications
Object Ordering with Bidirectional Matchings for Visual Reasoning
eng_Latn
4,893
Learn&Fuzz: Machine learning for input fuzzing
Automated testing of refactoring engines
Analyzing Memory Accesses in x86 Executables
eng_Latn
4,894
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity
HAFIX: Hardware-Assisted Flow Integrity eXtension
Multi-Objective Search Results Clustering
eng_Latn
4,895
Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware !
Exploring Multiple Execution Paths for Malware Analysis
A weakly informative default prior distribution for logistic and other regression models
eng_Latn
4,896
A Large-Scale Empirical Study of Security Patches
An empirical study on real bug fixes
Low-cost Autonomous Navigation System Based on Optical Flow Classification
kor_Hang
4,897
Active refocusing of images and videos
Shape from Focus
An empirical model to predict security vulnerabilities using code complexity metrics
eng_Latn
4,898
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity
Interpreter Exploitation
Using Deep Learning and Google Street View to Estimate the De- mographic Makeup of the US
eng_Latn
4,899