Author:
Prakash Aravind,Yin Heng,Liang Zhenkai
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. UUT: Unveiling Unknown Threats with Machine Learning for Exploit Detection;2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT);2024-01-04
2. Capturing Invalid Input Manipulations for Memory Corruption Diagnosis;IEEE Transactions on Dependable and Secure Computing;2023-03-01
3. Software Control Flow Anomaly Detection Technology Based On Neural Network;Proceedings of the 2022 2nd International Conference on Control and Intelligent Robotics;2022-06-24
4. StateFormer: fine-grained type recovery from binaries using generative state modeling;Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering;2021-08-18
5. ChaffyScript: Vulnerability-Agnostic Defense of JavaScript Exploits via Memory Perturbation;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2019