4.6 Article

V-Fuzz: Vulnerability Prediction-Assisted Evolutionary Fuzzing for Binary Programs

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Automation & Control Systems

Deep Network Embedding for Graph Representation Learning in Signed Networks

Xiao Shen et al.

IEEE TRANSACTIONS ON CYBERNETICS (2020)

Article Automation & Control Systems

A Novel Deep Learning-Based Collaborative Filtering Model for Recommendation System

Mingsheng Fu et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Automation & Control Systems

DIOD: Fast and Efficient Weakly Semi-Supervised Deep Complex ISAR Object Detection

Bin Xue et al.

IEEE TRANSACTIONS ON CYBERNETICS (2019)

Article Computer Science, Artificial Intelligence

A Comprehensive Survey of Graph Embedding: Problems, Techniques, and Applications

HongYun Cai et al.

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2018)

Proceedings Paper Computer Science, Theory & Methods

Hawkeye: Towards a Desired Directed Grey-box Fuzzer

Hongxu Chen et al.

PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18) (2018)

Proceedings Paper Computer Science, Theory & Methods

CollAFL: Path Sensitive Fuzzing

Shuitao Gan et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Theory & Methods

Angora: Efficient Fuzzing by Principled Search

Peng Chen et al.

2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2018)

Proceedings Paper Computer Science, Information Systems

Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection

Xiaojun Xu et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Information Systems

Directed Greybox Fuzzing

Marcel Bohme et al.

CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2017)

Proceedings Paper Computer Science, Software Engineering

Steelix: Program-State Based Binary Fuzzing

Yuekang Li et al.

ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING (2017)

Proceedings Paper Computer Science, Information Systems

Guiding a Colony of Black-box Fuzzers with Chemotaxis

Konstantin Boettinger

2017 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2017) (2017)

Article Automation & Control Systems

Learning Hierarchical Spectral-Spatial Features for Hyperspectral Image Classification

Yicong Zhou et al.

IEEE TRANSACTIONS ON CYBERNETICS (2016)

Proceedings Paper Computer Science, Theory & Methods

LAVA: Large-scale Automated Vulnerability Addition

Brendan Dolan-Gavitt et al.

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2016)

Proceedings Paper Computer Science, Software Engineering

Deep Learning for Just-In-Time Defect Prediction

Xinli Yang et al.

2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015) (2015)

Article Computer Science, Software Engineering

Can traditional fault prediction models be used for vulnerability prediction?

Yonghee Shin et al.

EMPIRICAL SOFTWARE ENGINEERING (2013)