咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 87 篇 期刊文献
  • 5 篇 学位论文

馆藏范围

  • 202 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 186 篇 工学
    • 151 篇 计算机科学与技术...
    • 74 篇 软件工程
    • 51 篇 电气工程
    • 25 篇 信息与通信工程
    • 11 篇 控制科学与工程
    • 7 篇 电子科学与技术(可...
    • 5 篇 网络空间安全
    • 4 篇 机械工程
    • 2 篇 材料科学与工程(可...
    • 1 篇 力学(可授工学、理...
    • 1 篇 光学工程
    • 1 篇 仪器科学与技术
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
    • 1 篇 安全科学与工程
  • 13 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 10 篇 理学
    • 8 篇 数学
    • 1 篇 物理学
    • 1 篇 化学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 法学
    • 1 篇 法学
  • 1 篇 教育学
    • 1 篇 教育学
  • 1 篇 医学
    • 1 篇 临床医学
  • 1 篇 军事学

主题

  • 202 篇 control flow gra...
  • 11 篇 static analysis
  • 9 篇 program dependen...
  • 8 篇 deep learning
  • 8 篇 software testing
  • 7 篇 program slicing
  • 7 篇 program analysis
  • 7 篇 data flow analys...
  • 7 篇 abstract syntax ...
  • 7 篇 malware detectio...
  • 6 篇 graph neural net...
  • 6 篇 flow graphs
  • 6 篇 vulnerability de...
  • 6 篇 cfg
  • 6 篇 malware
  • 5 篇 regression testi...
  • 5 篇 reverse engineer...
  • 5 篇 control flow int...
  • 5 篇 cybersecurity
  • 5 篇 symbolic executi...

机构

  • 5 篇 indian inst tech...
  • 3 篇 brno university ...
  • 3 篇 northwestern pol...
  • 2 篇 vnu univ engn & ...
  • 2 篇 zhongguancun lab...
  • 2 篇 sun yat sen univ...
  • 2 篇 sungkyunkwan uni...
  • 2 篇 东南大学
  • 2 篇 kagawa univ fac ...
  • 2 篇 delft univ techn...
  • 2 篇 peking univ key ...
  • 2 篇 beijing inst sys...
  • 2 篇 univ fed juiz de...
  • 2 篇 sun yat sen univ...
  • 2 篇 guangzhou univ s...
  • 2 篇 brandon univ dep...
  • 2 篇 natl inst techno...
  • 2 篇 the university o...
  • 2 篇 harbin engn univ...
  • 2 篇 peking univ sch ...

作者

  • 3 篇 alrasheed hend
  • 3 篇 rosen bk
  • 3 篇 mall r
  • 3 篇 ullah farhan
  • 3 篇 chimalakonda sri...
  • 3 篇 melton austin
  • 2 篇 zadeck fk
  • 2 篇 sofokleous anast...
  • 2 篇 facon adrien
  • 2 篇 ullah shamsher
  • 2 篇 xiaosen wen
  • 2 篇 lee kwangwoo
  • 2 篇 cao yongzhi
  • 2 篇 mund gb
  • 2 篇 gupta r
  • 2 篇 wegman mn
  • 2 篇 lukacs daniel
  • 2 篇 srivastava gauta...
  • 2 篇 wang ke-hui
  • 2 篇 timbert michael

语言

  • 192 篇 英文
  • 6 篇 其他
  • 3 篇 中文
  • 1 篇 葡萄牙文
检索条件"主题词=Control Flow Graph"
202 条 记 录,以下是161-170 订阅
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysis  23
Arvin: Greybox Fuzzing Using Approximate Dynamic CFG Analysi...
收藏 引用
18th ACM ASIA Conference on Computer and Communications Security (ASIA CCS)
作者: Shahini, Sirus Zhang, Mu Payer, Mathias Ricci, Robert Univ Utah Salt Lake City UT 84112 USA Ecole Polytech Fed Lausanne Lausanne Switzerland
Fuzzing has emerged as the most broadly used testing technique to discover bugs. Effective fuzzers rely on coverage to prioritize inputs that exercise new program areas. Edge-based code coverage of the Program Under T... 详细信息
来源: 评论
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generation
H-Fuzzing: A New Heuristic Method for Fuzzing Data Generatio...
收藏 引用
8th IFIP International Conference on Network and Parallel Computing
作者: Zhao, Jinjing Wen, Yan Zhao, Gang Beijing Inst Syst Engn Beijing Peoples R China
How to efficiently reduce the fuzzing data scale while assuring high fuzzing veracity and vulnerability coverage is a pivotal issue in program fuzz test. This paper proposes a new heuristic method for fuzzing data gen... 详细信息
来源: 评论
On-the-Fly Dynamic Dead Variable Analysis
On-the-Fly Dynamic Dead Variable Analysis
收藏 引用
作者: Joel P. Self Brigham Young University
学位级别:硕士
State explosion in model checking continues to be the primary obstacle to widespread use of software model checking. The large input ranges of variables used in software is the main cause of state explosion. As softwa... 详细信息
来源: 评论
"Application of River Formation Dynamics in Search Based Software Engineering"
"Application of River Formation Dynamics in Search Based Sof...
收藏 引用
作者: YOGITA KHATRI Delhi Technological University
学位级别:硕士
Search Based Software Engineering (SBSE) is an emerging field, involves applying search based techniques to address the various problems related to different domains of software engineering. It is specially excelled i... 详细信息
来源: 评论
Transformace Windows PE do grafu toku řízení
Transformace Windows PE do grafu toku řízení
收藏 引用
作者: Jirák, Ota Brno University of Technology
Tato práce pojednává o formátu spustitelných souborů EXE. Soustředí se na části potřebné při reverzním inženýrství. Dále se zabývá jazykem sym... 详细信息
来源: 评论
Extrakce grafu toku řízení z formátu LLVM IR
Extrakce grafu toku řízení z formátu LLVM IR
收藏 引用
作者: Kondula, Václav Brno University of Technology
Tato bakalářská práce se zabývá návrhem a implementací extrakce grafů toku řízení ze zdrojových souborů jazyků C a C++ ve formátu LLVM IR. K tomu účelu bylo ... 详细信息
来源: 评论
Droid-MCFG: Android malware detection system using manifest and control flow traces with multi-head temporal convolutional network
收藏 引用
PHYSICAL COMMUNICATION 2023年 第1期57卷
作者: Ullah, Farhan Ullah, Shamsher Srivastava, Gautam Lin, Erry Chun-Wei Northwestern Polytech Univ Sch Software Xian 710072 Shaanxi Peoples R China Univ Management & Technol Knowledge Units Syst & Technol KUST Sialkot 51040 Pakistan Brandon Univ Dept Math & Comp Sci Brandon MB R7A 6A9 Canada Western Norway Univ Appl Sci Dept Comp Sci Elect Engn & Math Sci Bergen Norway China Med Univ Res Ctr Interneural Comp Taichung Taiwan Lebanese Amer Univ Dept Comp Sci & Math Beirut Lebanon
Android is the most popular mobile operating system, making it the main target of malware attacks. Machine learning-based attack detection techniques have recently emerged as promising methods that relies heavily on p... 详细信息
来源: 评论
Speculation-Free Function Table Construction in LLVM IR for Fine-Grained control flow Integrity
收藏 引用
JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS 2023年 第16期32卷
作者: Zhao, Sirong Yu, Xuejun Luo, Jianchun Xie, Guoqi Hunan Univ Coll Comp Sci & Elect Engn Key Lab Embedded & Network Comp Hunan Prov Changsha 410082 Hunan Peoples R China Wuhan Digital Engn Inst Wuhan 430000 Hubei Peoples R China Huanan Univ Chongqing Res Inst Chongqing 401120 Peoples R China
Securing the operating system kernel is the key to overall system security. Due to developer negligence and the inherent limitations of the code language, kernel data is exposed to various security risks, such as exec... 详细信息
来源: 评论
A vulnerability detection framework with enhanced graph feature learning
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2024年 216卷
作者: Cheng, Jianxin Chen, Yizhou Cao, Yongzhi Wang, Hanpin Peking Univ Key Lab High Confidence Software Technol Minist Educ Beijing Peoples R China Peking Univ Sch Comp Sci Beijing Peoples R China Zhongguancun Lab Beijing Peoples R China Guangzhou Univ Sch Comp Sci & Cyber Engn Guangzhou Peoples R China
Vulnerability detection in smart contracts is critical to secure blockchain systems. Existing methods represent the bytecode as a graph structure and leverage graph neural networks to learn graph features for vulnerab... 详细信息
来源: 评论
Scratchpad Sharing in GPUs
收藏 引用
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION 2017年 第2期14卷 15-15页
作者: Jatala, Vishwesh Anantpur, Jayvant Karkare, Amey Indian Inst Technol Dept CSE Kanpur 208016 Uttar Pradesh India Indian Inst Sci Supercomp Educ & Res Ctr SERC Bangalore 560012 Karnataka India
General-Purpose graphics Processing Unit (GPGPU) applications exploit on-chip scratchpad memory available in the graphics Processing Units (GPUs) to improve performance. The amount of thread level parallelism (TLP) pr... 详细信息
来源: 评论