共 36 条
[31]
To Fear or Not to Fear That is the Question: Code Characteristics of a Vulnerable Function with an Existing Exploit
[J].
CODASPY'16: PROCEEDINGS OF THE SIXTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY,
2016,
:97-104
[32]
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks
[J].
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING,
2021, 8 (02)
:1502-1516
[34]
CBA-Detector: An Accurate Detector Against Cache-Based Attacks Using HPCs and Pintools
[J].
ADVANCED PARALLEL PROCESSING TECHNOLOGIES (APPT 2019),
2019, 11719
:109-122
[36]
Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs
[J].
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019),
2019,