Title
Mechanical Phish: Resilient Autonomous Hacking.
Abstract
The size and complexity of software is increasing, and security flaws are becoming more numerous, sophisticated, and impactful. While the vulnerability identification process (especially in hard-to-analyze binary programs) has traditionally been driven by highly skilled human analysts, this approach does not scale, given the vast amount of deployed software. Recently, the vulnerability analysis pr...
Year
DOI
Venue
2018
10.1109/MSP.2018.1870858
IEEE Security & Privacy
Keywords
Field
DocType
Computer security,Linux,Computer crashes,Computer hacking,Computer crime,Autonomous systems,Phishing
Computer science,Vulnerability assessment,Computer security,Knowledge-based systems,Hacker,Exploit,Software,Autonomous system (Internet),Reasoning system,Vulnerability
Journal
Volume
Issue
ISSN
16
2
1540-7993
Citations 
PageRank 
References 
2
0.39
0
Authors
14
Name
Order
Citations
PageRank
Yan Shoshitaishvili135826.98
Antonio Bianchi235113.41
Kevin Borgolte3678.48
Amat Cama420.39
Jacopo Corbetta5461.79
Francesco Disperati620.39
Andrew Dutcher71594.90
John Grosen81685.39
Paul Grosen9110.88
Aravind Machiry1034016.35
Christopher Salls111987.90
Nick Stephens121686.10
Ruoyu Wang1328216.23
Giovanni Vigna147121507.72