VarCLR: Variable Semantic Representation Pre-training via Contrastive Learning | 0 | 0.34 | 2022 |
Augmenting Decompiler Output with Learned Variable Names and Types | 0 | 0.34 | 2022 |
The Art, Science, and Engineering of Fuzzing: A Survey | 14 | 0.84 | 2021 |
A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks | 0 | 0.34 | 2020 |
DIRE - A Neural Approach to Decompiled Identifier Naming. | 5 | 0.43 | 2019 |
Meaningful variable names for decompiled code: a machine translation approach. | 4 | 0.42 | 2018 |
Using Logic Programming to Recover C++ Classes and Methods from Compiled Executables. | 2 | 0.36 | 2018 |
Fuzzing: Art, Science, and Engineering. | 0 | 0.34 | 2018 |
Statistical Machine Translation Is a Natural Fit for Automatic Identifier Renaming in Software Source Code. | 0 | 0.34 | 2018 |
Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? | 3 | 0.41 | 2016 |
Automatic exploit generation | 35 | 1.14 | 2014 |
Access to multimodal articles for individuals with sight impairments | 8 | 0.53 | 2012 |
The Danger of Unrandomized Code. | 0 | 0.34 | 2011 |
BAP: a binary analysis platform | 135 | 3.66 | 2011 |
Q: exploit hardening made easy | 81 | 3.22 | 2011 |
How to model a TCP/IP network using only 20 parameters | 0 | 0.34 | 2010 |
Contractual Anonymity. | 0 | 0.34 | 2010 |
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) | 228 | 7.89 | 2010 |
Interactive SIGHT demo: textual summaries of simple bar charts | 1 | 0.36 | 2010 |
Interactive SIGHT: textual access to simple bar charts | 7 | 0.50 | 2010 |
Interactive SIGHT into information graphics | 14 | 0.82 | 2010 |