Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts | 0 | 0.34 | 2022 |
Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing | 0 | 0.34 | 2021 |
Hunting Vulnerable Smart Contracts Via Graph Embedding Based Bytecode Matching | 0 | 0.34 | 2021 |
StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting | 2 | 0.36 | 2021 |
Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness | 0 | 0.34 | 2021 |
OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary | 0 | 0.34 | 2021 |
Finding client-side business flow tampering vulnerabilities | 1 | 0.34 | 2020 |
BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation | 0 | 0.34 | 2019 |
Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter. | 11 | 0.90 | 2016 |