Search is not available for this dataset
query
stringlengths 1
13.4k
| pos
stringlengths 1
61k
| neg
stringlengths 1
63.9k
| query_lang
stringclasses 147
values | __index_level_0__
int64 0
3.11M
|
---|---|---|---|---|
A general path-based representation for predicting program properties | Predicting Program Properties from "Big Code" | A parameter-free hedging algorithm | eng_Latn | 4,800 |
Protecting Software through Obfuscation: Can It Keep Pace with Progress in Code Analysis? | A heuristic approach for detection of obfuscated malware | Behavioral detection of malware: from a survey towards an established taxonomy | eng_Latn | 4,801 |
Geographic proximity to coal plants and U.S. public support for extending the Production Tax Credit | Media framing and public attitudes toward biofuels. | HEMD: a highly efficient random forest-based malware detection framework for Android | eng_Latn | 4,802 |
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks | Jump-oriented programming: a new class of code-reuse attack | GraphIE: A Graph-Based Framework for Information Extraction | kor_Hang | 4,803 |
Building Decision Tree Classifier on Private Data | how to play any mental game or a completeness theorem for protocols with honest majority . | SMM Rootkits: A New Breed of OS Independent Malware | eng_Latn | 4,804 |
Malware Lineage in the Wild | Rendezvous: A search engine for binary code | Combining symbolic execution with model checking to verify parallel numerical programs | eng_Latn | 4,805 |
Ransomware: A Rising Threat of new age Digital Extortion | Comparative analysis of various ransomware virii | optimizations for embedded systems and FFT | eng_Latn | 4,806 |
KCoFI: Complete Control-Flow Integrity for Commodity Operating System Kernels | control flow integrity for cots binaries . | Aligned Image-Word Representations Improve Inductive Transfer Across Vision-Language Tasks | eng_Latn | 4,807 |
Clustering and visualization of mobile application permissions for end users and malware analysts | Evolution, Detection and Analysis of Malware for Smart Devices | 3D Robot Pose Estimation from 2D Images | eng_Latn | 4,808 |
ASN: A Dynamic Barrier-Based Approach to Confirmation of Deadlocks from Warnings for Large-Scale Multithreaded Programs | Learning from mistakes: a comprehensive study on real world concurrency bug characteristics | Pin: building customized program analysis tools with dynamic instrumentation | eng_Latn | 4,809 |
A Taint Based Approach for Smart Fuzzing | An Empirical Study of the Reliability of UNIX Utilities | A Robot Operating System (ROS) based humanoid robot control | eng_Latn | 4,810 |
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine | Secure virtual architecture: a safe execution environment for commodity operating systems | Reviewing the Concept of Brand Equity and Evaluating Consumer-Based Brand Equity (CBBE) Models | kor_Hang | 4,811 |
Android Root and its Providers: A Double-Edged Sword | Obfuscation resilient binary code reuse through trace-oriented programming | Acetabular fractures: what radiologists should know and how 3D CT can aid classification. | eng_Latn | 4,812 |
What can N-grams learn for malware detection? | A scalable multi-level feature extraction technique to detect malicious executables | A comparison of index-based lempel-Ziv LZ77 factorization algorithms | eng_Latn | 4,813 |
Malware detection using adaptive data compression | Deobfuscation: reverse engineering obfuscated code | HER2 in Breast Cancer Stemness: A Negative Feedback Loop towards Trastuzumab Resistance | eng_Latn | 4,814 |
Differentiating malware from cleanware using behavioural analysis | Limits of Static Analysis for Malware Detection | A Review and Meta-Analysis of Age-Based Stereotype Threat: Negative Stereotypes, Not Facts, Do the Damage | eng_Latn | 4,815 |
On the Relation between External Software Quality and Static Code Analysis | If your bug database could talk | Towards a metrics suite for object oriented design | eng_Latn | 4,816 |
CASPER: Compiler-Assisted Securing of Programs at Runtime | StackGhost: Hardware Facilitated Stack Protection | Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services | eng_Latn | 4,817 |
An effective approach for classification of advanced malware with high accuracy | CODE OBFUSCATION AND VIRUS DETECTION | A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications | eng_Latn | 4,818 |
Architectural Support for Software-Defined Metadata Processing | Stitching the gadgets: on the ineffectiveness of coarse-grained control-flow integrity protection | Issues Concerning Integration of Unmanned Aerial Vehicles in Civil Airspace November 2004 | eng_Latn | 4,819 |
dowsing for overflows : a guided fuzzer to find buffer boundary violations . | LLVM: a compilation framework for lifelong program analysis & transformation | Word lengths are optimized for efficient communication | eng_Latn | 4,820 |
Shift-Reduce CCG Parsing | Perceptron Reranking for CCG Realization | A hybrid symbolic execution assisted fuzzing method | eng_Latn | 4,821 |
A case study on the relationship between code ownership and refactoring activities in a Java software system | Assert Use in GitHub Projects | A future-adaptable password scheme | eng_Latn | 4,822 |
Security Analysis of the edX Platform | When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries | Holding intruders accountable on the Internet | eng_Latn | 4,823 |
A source code linearization technique for detecting plagiarized programs | Clone detection using abstract syntax trees | Social Categorization and the Perception of Groups and Group Differences | eng_Latn | 4,824 |
A comparison of static, dynamic, and hybrid analysis for malware detection | Graph-based malware detection using dynamic analysis | Planning Formalisms and Authoring in Interactive Storytelling | eng_Latn | 4,825 |
Vulnerable GPU Memory Management: Towards Recovering Raw Data from GPU | Confidentiality issues on a GPU in a virtualized environment | Obfuscation resilient binary code reuse through trace-oriented programming | kor_Hang | 4,826 |
Automatic Testing of Program Security Vulnerabilities | Automatic creation of SQL Injection and cross-site scripting attacks | Introduction to automata theory, languages, and computation, 2nd edition | eng_Latn | 4,827 |
Hardware-enforced Protection against Software Reverse-Engineering based on an Instruction Set Encoding | Deobfuscation: reverse engineering obfuscated code | Fashion Style in 128 Floats: Joint Ranking and Classification Using Weak Data for Feature Extraction | eng_Latn | 4,828 |
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine | Secure virtual architecture: a safe execution environment for commodity operating systems | Secure program execution via dynamic information flow tracking | kor_Hang | 4,829 |
Evolution of evasive malwares: A survey | Barecloud: bare-metal analysis-based evasive malware detection | Index Modulation for 5G: Striving to Do More with Less | eng_Latn | 4,830 |
Regular property guided dynamic symbolic execution | Symbolic PathFinder: symbolic execution of Java bytecode | Image Deblurring with Blurred / Noisy Image Pairs | eng_Latn | 4,831 |
A malware instruction set for behavior-based analysis | Scalable, Behavior-Based Malware Clustering | Control and Operation of a DC Microgrid With Variable Generation and Energy Storage | eng_Latn | 4,832 |
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code | Defeating return-oriented rootkits with "Return-Less" kernels | a survey of dimension reduction methods for high - dimensional data analysis and visualization . | eng_Latn | 4,833 |
FlexVec: auto-vectorization for irregular loops | Pin: building customized program analysis tools with dynamic instrumentation | Linear scan register allocation | eng_Latn | 4,834 |
towards practical taint tracking . | Tainting is not pointless | Correction of True Hanging Columella Using Medial Crural Tuck-Up Technique | eng_Latn | 4,835 |
Efficient GPU Screen-Space Ray Tracing | Fast Global Illumination Approximations on Deep G-Buffers | FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints | eng_Latn | 4,836 |
On-demand transparency for improving hardware Trojan detectability | Trojan Detection using IC Fingerprinting | Electromagnetic Analysis: Concrete Results | eng_Latn | 4,837 |
CoGENT: Verifying High-Assurance File System Implementations | seL4: formal verification of an OS kernel | CIL: Intermediate language and tools for analysis and transformation of C programs | eng_Latn | 4,838 |
The static analysis of WannaCry ransomware | Dridex: Analysis of the traffic and automatic generation of IOCs | What-If Reasoning with Counterfactual Gaussian Processes | eng_Latn | 4,839 |
malware detection using integrated static and dynamic analysis . | Limits of Static Analysis for Malware Detection | Why Interventions to Influence Adolescent Behavior Often Fail but Could Succeed | eng_Latn | 4,840 |
Development of dynamic protection against timing channels | A critical review of "automatic patch generation learned from human-written patches": essay on the problem statement and the evaluation of automatic software repair | Incorporating Advice into Neuroevolution of Adaptive Agents | eng_Latn | 4,841 |
The Use of Summation to Aggregate Software Metrics Hinders the Performance of Defect Prediction Models | Software metrics: roadmap | Model-based Analysis of ChIP-Seq (MACS) | eng_Latn | 4,842 |
An Empirical Study on Detecting and Fixing Buffer Overflow Bugs | BitBlaze: A new approach to computer security via binary analysis | BitScope: Automatically dissecting malicious binaries | eng_Latn | 4,843 |
Virtual ghost: protecting applications from hostile operating systems | Implementing an untrusted operating system on trusted hardware | Biodiversity and Ecosystem Functioning : Maintaining Natural Life Support Processes SUMMARY | eng_Latn | 4,844 |
Rozzle: De-cloaking Internet Malware | Automated Whitebox Fuzz Testing | A general framework for never-ending learning from time series streams | eng_Latn | 4,845 |
SIN2: Stealth infection on neural network — A low-cost agile neural Trojan attack methodology | A Survey of Malware Detection Techniques | Merging event logs for process mining: A rule based merging method and rule suggestion algorithm | eng_Latn | 4,846 |
Reverse Engineering Flash EEPROM Memories Using Scanning Electron Microscopy | A high efficiency Hardware Trojan detection technique based on fast SEM imaging | Understanding Sustained Participation in Open Source Software Projects | kor_Hang | 4,847 |
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences | Finding Plagiarisms among a Set of Programs with JPlag | Flow and Regulatory Compatibility: An Experimental Approach to the Flow Model of Intrinsic Motivation | eng_Latn | 4,848 |
SCRAP: Architecture for signature-based protection from Code Reuse Attacks | StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks | Content Adaptive Enhancement of Multi-View Depth Maps for Free Viewpoint Video | eng_Latn | 4,849 |
Validation and verification of computer forensic software tools d Searching Function | Digital forensics: exploring validation, verification & certification | Defining Digital Forensic Examination and Analysis Tool Using Abstraction Layers | eng_Latn | 4,850 |
Problem characterization and abstraction for visual analytics in behavior-based malware pattern analysis | A survey on automated dynamic malware-analysis techniques and tools | Human Action Recognition Using Improved Salient Dense Trajectories | eng_Latn | 4,851 |
A Robust Method for Prevention of Second Order and Stored Procedure based SQL Injections | Static detection of security vulnerabilities in scripting languages | Beyond Geometric Path Planning: Learning Context-Driven Trajectory Preferences via Sub-optimal Feedback | eng_Latn | 4,852 |
cork : dynamic memory leak detection for java . | Visualizing reference patterns for solving memory leaks in Java | Web application security vulnerabilities detection approaches: A systematic mapping study | eng_Latn | 4,853 |
CP-Miner: finding copy-paste and related bugs in large-scale software code | CCFinder: a multilinguistic token-based code clone detection system for large scale source code | midline cleft lip and bifid nose deformity : description , classification , and treatment . | eng_Latn | 4,854 |
Detecting source code similarity using code abstraction | Introduction to Algorithms, 3rd Edition | web application firewall - dot defender . | eng_Latn | 4,855 |
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification | AEG: Automatic Exploit Generation | Accuracy of electronic apex locators to detect root canal perforations with inserted metallic posts: an ex vivo study | eng_Latn | 4,856 |
PSHAPE: Automatically Combining Gadgets for Arbitrary Method Execution | Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications | Pseudo-Random Number Generators for Massively Parallel Discrete-Event Simulation | eng_Latn | 4,857 |
Comparing Different Moving Target Defense Techniques | N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION | graph computation for machine learning . | eng_Latn | 4,858 |
cp - miner : a tool for finding copy - paste and related bugs in operating system code . | CCured in the real world | Pattern matching for clone and concept detection | eng_Latn | 4,859 |
AccessMiner: using system-centric models for malware protection | A Layered Architecture for Detecting Malicious Behaviors | SVO: Fast semi-direct monocular visual odometry | eng_Latn | 4,860 |
Proposal Techniques and Solutions for Addressing Ransomware Attacks | Toward Automated Dynamic Malware Analysis Using CWSandbox | Influence modeling in behavioral data | eng_Latn | 4,861 |
Malware and Machine Learning | A malware instruction set for behavior-based analysis | Eureka: A Framework for Enabling Static Malware Analysis | eng_Latn | 4,862 |
Automatic vulnerability mining with abstract interpretation and static taint trace | Taint-based directed whitebox fuzzing | Automatic Network Protocol Analysis | eng_Latn | 4,863 |
Ariadne: A Minimal Approach to State Continuity. | Sanctum: Minimal Hardware Extensions for Strong Software Isolation | Situation assessment algorithm for a collision prevention assistant | kor_Hang | 4,864 |
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine | Efficient software-based fault isolation | Magnetic Fields and Forces in Permanent Magnet Levitated Bearings | eng_Latn | 4,865 |
Toward sensitive document release with privacy guarantees | Privacy-preserving data publishing: A survey of recent developments | efficient on - the - fly data race detection in multihreaded c + + programs . | eng_Latn | 4,866 |
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. | Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities | Shape reconstruction from gradient data | eng_Latn | 4,867 |
Automatic Heavy-weight Static Analysis Tools for Fin- ding Bugs in Safety-critical Embedded C/C++ Code | An overview on the Static Code Analysis approach in Software Development | Web-CAT: automatically grading programming assignments | eng_Latn | 4,868 |
Embedded Devices Security and Firmware Reverse Engineering BH 13 US Workshop | Firmware modification attacks on programmable logic controllers | afrl - osr - va - tr - 2013 - 0439 autonomic recovery : hypercheck : a hardware - assisted integrity monitor . | eng_Latn | 4,869 |
DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware | Automatic Inference of Search Patterns for Taint-Style Vulnerabilities | Management of pediatric corneal limbal dermoids | eng_Latn | 4,870 |
Malware Detection on General-Purpose Computers Using Power Consumption Monitoring: A Proof of Concept and Case Study | Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces | TARP: ticket-based address resolution protocol | eng_Latn | 4,871 |
SAGE: whitebox fuzzing for security testing | Automated Whitebox Fuzz Testing | Consumer perceptions of product packaging | eng_Latn | 4,872 |
Distributed Packet Inspection By Using PIL-2 Language | BPF+: exploiting global data-flow optimization in a generalized packet filter architecture | Advanced persistent threats: Behind the scenes | eng_Latn | 4,873 |
Dynamic vs. Static Flow-Sensitive Security Analysis | Civitas: Toward a Secure Voting System | N-VERSION PROGRAMMING : A FAULT-TOLERANCE APPROACH TO RELIABILITY OF SOFTWARE OPERATION | kor_Hang | 4,874 |
Network-level polymorphic shellcode detection using emulation | Address obfuscation: an efficient approach to combat a broad range of memory error exploits | Linear pattern matching algorithms | eng_Latn | 4,875 |
A Real-Time Audit Mechanism Based on the Compression Technique | Principles of Analytic Monitoring for Continuous Assurance | Archimetrix: Improved Software Architecture Recovery in the Presence of Design Deficiencies | eng_Latn | 4,876 |
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection | Penumbra: automatically identifying failure-relevant inputs using dynamic tainting | Analyzing Memory Accesses in x86 Executables | eng_Latn | 4,877 |
Behave or be watched: debugging with behavioral watchpoints | How to shadow every byte of memory used by a program | Neural Circuitry of Wakefulness and Sleep | eng_Latn | 4,878 |
Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware | Peer-to-Peer Botnets: Overview and Case Study | A formally verified compiler for Lustre | eng_Latn | 4,879 |
Malware detection using assembly code and control flow graph optimization | Automated classification and analysis of internet malware | Periorbital necrobiosis lipoidica diabeticorum: case report | eng_Latn | 4,880 |
Static detection of security vulnerabilities in scripting languages | Flow-sensitive type qualifiers | Video games and spatial cognition. | eng_Latn | 4,881 |
A survey on server-side approaches to securing web applications | Static detection of security vulnerabilities in scripting languages | Identification and functional analysis of gene cluster involvement in biosynthesis of the cyclic lipopeptide antibiotic pelgipeptin produced by Paenibacillus elgii | eng_Latn | 4,882 |
Automatic Deobfuscation and Reverse Engineering of Obfuscated Code | Return-oriented programming without returns | Terminological Obfuscation in Online Research | eng_Latn | 4,883 |
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting | An Empirical Study of the Reliability of UNIX Utilities | Distributed REScala: an update algorithm for distributed reactive programming | eng_Latn | 4,884 |
Behavior based software theft detection | Valgrind: a framework for heavyweight dynamic binary instrumentation | Fast Ant Colony Optimization for Clustering | eng_Latn | 4,885 |
TxRace: Efficient Data Race Detection Using Commodity Hardware Transactional Memory | Automated memory leak detection for production use | Valgrind: A Program Supervision Framework | yue_Hant | 4,886 |
The future of grey-box fuzzing | BitBlaze: A new approach to computer security via binary analysis | Diapause in phytoseiid mites: a review | eng_Latn | 4,887 |
Comparing Quality Metrics for Cloned and Non Cloned Java Methods: A Large Scale Empirical Study | Substring matching for clone detection and change tracking | PCB pad design for board to board SMP connector | eng_Latn | 4,888 |
A Formal Approach to Identifying Security Vulnerabilities in Telecommunication Networks | ProB: an automated analysis toolset for the B method | Application of CRISPR/Cas9 in plant biology | eng_Latn | 4,889 |
LAVA: Large-Scale Automated Vulnerability Addition | Using a Diagnostic Corpus of C Programs to Evaluate Buffer Overflow Detection by Static Analysis Tools | Review of the Satisfaction with Life Scale | yue_Hant | 4,890 |
LKIM : The Linux Kernel Integrity | Linux kernel integrity measurement using contextual inspection | Towards operationalizingcomplexity leadership:How generative, administrativeand community-buildingleadership practices enactorganizational outcomes | eng_Latn | 4,891 |
Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software | Building diverse computer systems | Environmental Impact of Organic Agriculture | eng_Latn | 4,892 |
Automatic and scalable fault detection for mobile applications | A grey-box approach for automated GUI-model generation of mobile applications | Object Ordering with Bidirectional Matchings for Visual Reasoning | eng_Latn | 4,893 |
Learn&Fuzz: Machine learning for input fuzzing | Automated testing of refactoring engines | Analyzing Memory Accesses in x86 Executables | eng_Latn | 4,894 |
RAGuard: A Hardware Based Mechanism for Backward-Edge Control-Flow Integrity | HAFIX: Hardware-Assisted Flow Integrity eXtension | Multi-Objective Search Results Clustering | eng_Latn | 4,895 |
Full System Emulation : Achieving Successful Automated Dynamic Analysis of Evasive Malware ! | Exploring Multiple Execution Paths for Malware Analysis | A weakly informative default prior distribution for logistic and other regression models | eng_Latn | 4,896 |
A Large-Scale Empirical Study of Security Patches | An empirical study on real bug fixes | Low-cost Autonomous Navigation System Based on Optical Flow Classification | kor_Hang | 4,897 |
Active refocusing of images and videos | Shape from Focus | An empirical model to predict security vulnerabilities using code complexity metrics | eng_Latn | 4,898 |
RockJIT: Securing Just-In-Time Compilation Using Modular Control-Flow Integrity | Interpreter Exploitation | Using Deep Learning and Google Street View to Estimate the De- mographic Makeup of the US | eng_Latn | 4,899 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.