Abstract | ||
---|---|---|
The size and complexity of software is increasing, and security flaws are becoming more numerous, sophisticated, and impactful. While the vulnerability identification process (especially in hard-to-analyze binary programs) has traditionally been driven by highly skilled human analysts, this approach does not scale, given the vast amount of deployed software. Recently, the vulnerability analysis pr... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/MSP.2018.1870858 | IEEE Security & Privacy |
Keywords | Field | DocType |
Computer security,Linux,Computer crashes,Computer hacking,Computer crime,Autonomous systems,Phishing | Computer science,Vulnerability assessment,Computer security,Knowledge-based systems,Hacker,Exploit,Software,Autonomous system (Internet),Reasoning system,Vulnerability | Journal |
Volume | Issue | ISSN |
16 | 2 | 1540-7993 |
Citations | PageRank | References |
2 | 0.39 | 0 |
Authors | ||
14 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yan Shoshitaishvili | 1 | 358 | 26.98 |
Antonio Bianchi | 2 | 351 | 13.41 |
Kevin Borgolte | 3 | 67 | 8.48 |
Amat Cama | 4 | 2 | 0.39 |
Jacopo Corbetta | 5 | 46 | 1.79 |
Francesco Disperati | 6 | 2 | 0.39 |
Andrew Dutcher | 7 | 159 | 4.90 |
John Grosen | 8 | 168 | 5.39 |
Paul Grosen | 9 | 11 | 0.88 |
Aravind Machiry | 10 | 340 | 16.35 |
Christopher Salls | 11 | 198 | 7.90 |
Nick Stephens | 12 | 168 | 6.10 |
Ruoyu Wang | 13 | 282 | 16.23 |
Giovanni Vigna | 14 | 7121 | 507.72 |