Glyph: Efficient ML-Based Detection of Heap Spraying Attacks | 0 | 0.34 | 2021 |
BootKeeper - Validating Software Integrity Properties on Boot Firmware Images. | 0 | 0.34 | 2019 |
Detecting (absent) app-to-app authentication on cross-device short-distance channels | 0 | 0.34 | 2019 |
Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -. | 0 | 0.34 | 2017 |
Improving Mac OS X security through gray box fuzzing technique | 1 | 0.63 | 2014 |
A methodology for testing CPU emulators | 4 | 0.43 | 2013 |
Peering Into The Muddy Waters Of Pastebin | 2 | 0.39 | 2012 |
When hardware meets software: a bulletproof solution to forensic memory acquisition | 15 | 0.58 | 2012 |
Testing system virtual machines | 16 | 0.70 | 2010 |
N-version disassembly: differential testing of x86 disassemblers | 13 | 0.70 | 2010 |
Conqueror: tamper-proof code execution on legacy systems | 14 | 0.84 | 2010 |
Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings | 13 | 0.94 | 2009 |
Testing CPU emulators | 31 | 1.67 | 2009 |
A Framework for Behavior-Based Malware Analysis in the Cloud | 17 | 0.85 | 2009 |
FluXOR: Detecting and Monitoring Fast-Flux Service Networks | 56 | 4.35 | 2008 |
On Race Vulnerabilities in Web Applications | 10 | 0.66 | 2008 |
An Efficient Technique For Preventing Mimicry And Impossible Paths Execution Attacks | 8 | 0.53 | 2007 |
Code Normalization for Self-Mutating Malware | 29 | 1.48 | 2007 |
Code Normalization for Self-Mutating Malware | 29 | 1.48 | 2007 |
Code Normalization for Self-Mutating Malware | 29 | 1.48 | 2007 |
Code Normalization for Self-Mutating Malware | 29 | 1.48 | 2007 |
The 3rd International Workshop on Software Engineering for Secure Systems SESS07--Dependable and Secure | 0 | 0.34 | 2007 |
Diversified Process Replicae For Defeating Memory Error Exploits | 30 | 1.41 | 2007 |
Static Analysis on x86 Executables for Preventing Automatic Mimicry Attacks | 1 | 0.35 | 2007 |
Detecting self-mutating malware using control-flow graph matching | 89 | 4.28 | 2006 |
Introduction to software engineering for secure systems: SESS06 -- secure by design | 0 | 0.34 | 2006 |
String distances and intrusion detection: Bridging the gap between formal languages and computer security | 1 | 0.38 | 2006 |
Software engineering for secure systems | 1 | 0.35 | 2005 |
A protocol for anonymous and accurate e-polling | 4 | 0.85 | 2005 |
Replay Attack in TCG Specification and Solution | 22 | 1.28 | 2005 |
Voice over IPsec: Analysis and Solutions | 43 | 3.84 | 2002 |
Secure multicast in wireless networks of mobile hosts: protocols and issues | 26 | 1.60 | 2002 |
AngeL: a tool to disarm computer systems | 3 | 1.75 | 2001 |
A logarithmic lower bound for time-spread multiple-access (TSMA) protocols | 5 | 0.40 | 2000 |
Disarming offense to facilitate defense | 8 | 6.40 | 2000 |
Adding Availability to Log Services of Untrusted Machines | 3 | 0.41 | 1999 |
A mobility-transparent deterministic broadcast mechanism for ad hoc networks | 61 | 7.33 | 1999 |
A Tool for Pro-active Defense Against the Buffer Overrun Attack | 6 | 3.71 | 1998 |
Lower bounds for the broadcast problem in mobile radio networks | 90 | 5.01 | 1997 |
On the Difficulty of Finding Walks of Length k | 1 | 0.37 | 1997 |
Random Parallel Algorithms for Finding Exact Branchings, Perfect Matchings, and Cycles | 1 | 0.40 | 1995 |
On the existence of minimum asynchronous automata and on the equivalence problem for unambiguous regular trace languages | 3 | 0.43 | 1994 |
A user-friendly environment for parallel programming. | 4 | 0.51 | 1993 |
The complexity of computing maximal word functions | 13 | 0.71 | 1993 |
Strong separations of the polynomial hierarchy with oracles: constructive separations by immune and simple sets | 7 | 0.45 | 1992 |
Ranking and formal power series | 6 | 0.56 | 1991 |
The Complexity of Computing Maximal Word Functions | 0 | 0.34 | 1991 |
Strong Separations for the Boolean Hierarchy over RP | 9 | 0.51 | 1990 |
A Structural Overview of NP Optimization Problems | 13 | 5.00 | 1989 |
On the Existence of the Minimum Asynchronous Automaton and on Decision Problems for Unambiguous Regular Trace Languages | 5 | 0.52 | 1988 |