Linked e-resources
Details
Table of Contents
Hybrid Pruning: Towards A Precise Static Analysis
Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks
Prioritizing Antivirus Alerts on Internal Enterprise Machines
VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR
Branch Different - Spectre Attacks on Apple Silicon
MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.
Establishing the Contaminating Effect of Metadata Feature Inclusion in Machine-Learned Network Intrusion Detection Models
Extended Abstract: Effective Call Graph Fingerprinting for the Analysis and Classification of Windows Malware
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks
Prioritizing Antivirus Alerts on Internal Enterprise Machines
VANDALIR: Vulnerability Analyses based on Datalog and LLVM-IR
Branch Different - Spectre Attacks on Apple Silicon
MPKAlloc: Efficient Heap Meta-Data Integrity Through Hardware Memory Protection Keys
A Human in Every APE: Delineating and Evaluating the Human Analysis Systems of Anti-Phishing Entities
Amplification Chamber: Dissecting the Attack Infrastructure of Memcached DRDoS Attacks
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots.