CANflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks | 0 | 0.34 | 2022 |
SyML - Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning. | 0 | 0.34 | 2021 |
NoSQL Breakdown - A Large-scale Analysis of Misconfigured NoSQL Services. | 0 | 0.34 | 2020 |
Evasion Attacks against Banking Fraud Detection Systems. | 0 | 0.34 | 2020 |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots | 1 | 0.37 | 2019 |
Security Evaluation of a Banking Fraud Analysis System. | 0 | 0.34 | 2018 |
Elisa: Eliciting Isa Of Raw Binaries For Fine-Grained Code And Data Separation | 2 | 0.36 | 2018 |
Measuring and Defeating Anti-Instrumentation-Equipped Malware. | 3 | 0.36 | 2017 |
An Experimental Security Analysis of an Industrial Robot Controller | 10 | 0.80 | 2017 |
Prometheus: Analyzing WebInject-based information stealers. | 3 | 0.41 | 2017 |
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis. | 64 | 1.82 | 2016 |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. | 24 | 0.73 | 2016 |
Jackdaw: Towards Automatic Reverse Engineering of Large Datasets of Binaries | 5 | 0.41 | 2015 |