咨询与建议

限定检索结果

文献类型

  • 4 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 8 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 5 篇 计算机科学与技术...
    • 3 篇 电气工程
    • 3 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 网络空间安全
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 8 篇 exploit code
  • 2 篇 synthetic worms
  • 2 篇 intrusion detect...
  • 2 篇 worm signature
  • 1 篇 intrusion detect...
  • 1 篇 systems software
  • 1 篇 codebert
  • 1 篇 paste sites
  • 1 篇 code division
  • 1 篇 coded diversity
  • 1 篇 transformers
  • 1 篇 topic modeling
  • 1 篇 enabling
  • 1 篇 noise radar
  • 1 篇 attackers
  • 1 篇 anomaly score
  • 1 篇 malicious conten...
  • 1 篇 bert
  • 1 篇 access points
  • 1 篇 sparse represent...

机构

  • 1 篇 univ arizona dep...
  • 1 篇 univ sains malay...
  • 1 篇 minist ind & inf...
  • 1 篇 ibm corp thomas ...
  • 1 篇 carnegie mellon ...
  • 1 篇 carnegie mellon ...
  • 1 篇 nav6 center of e...
  • 1 篇 nantong univ sch...
  • 1 篇 etri attached in...
  • 1 篇 korea univ grad ...
  • 1 篇 nanjing univ aer...
  • 1 篇 natl sun yat sen...
  • 1 篇 washington univ ...
  • 1 篇 carnegie mellon ...
  • 1 篇 birkbeck univ lo...
  • 1 篇 indiana univ dep...

作者

  • 1 篇 ampel benjamin
  • 1 篇 nehorai arye
  • 1 篇 khosla pradeep
  • 1 篇 chen hsinchun
  • 1 篇 choi younghan
  • 1 篇 van doorn leende...
  • 1 篇 vahedi tala
  • 1 篇 lee donghoon
  • 1 篇 sureswaran ramad...
  • 1 篇 altyeb altyeb al...
  • 1 篇 seshadri arvind
  • 1 篇 abdulla shubair ...
  • 1 篇 chen chia-mei
  • 1 篇 luk mark
  • 1 篇 yang guang
  • 1 篇 chen xiang
  • 1 篇 perrig adrian
  • 1 篇 lin hsiao-chung
  • 1 篇 zhou yu
  • 1 篇 chen taolue

语言

  • 8 篇 英文
检索条件"主题词=Exploit Code"
8 条 记 录,以下是1-10 订阅
排序:
exploitGen: Template-augmented exploit code generation based on codeBERT
收藏 引用
JOURNAL OF SYSTEMS AND SOFTWARE 2023年 197卷
作者: Yang, Guang Zhou, Yu Chen, Xiang Zhang, Xiangyu Han, Tingting Chen, Taolue Nanjing Univ Aeronaut & Astronaut Coll Comp Sci & Technol Nanjing Peoples R China Minist Ind & Informat Technol Key Lab Safety Crit Software Nanjing Peoples R China Nantong Univ Sch Informat Sci & Technol Nantong Peoples R China Birkbeck Univ London Dept Comp Sci & Data Sci London England
exploit code is widely used for detecting vulnerabilities and implementing defensive measures. However, automatic generation of exploit code for security assessment is a challenging task. In this paper, we propose a n... 详细信息
来源: 评论
STROP: Static Approach for Detection of Return-Oriented Programming Attack in Network
收藏 引用
IEICE TRANSACTIONS ON COMMUNICATIONS 2015年 第1期E98B卷 242-251页
作者: Choi, YoungHan Lee, DongHoon ETRI Attached Inst Taejon 305600 South Korea Korea Univ Grad Sch Informat & Secur Seoul 136701 South Korea
Recently, a malicious user attacks a web browser through a malicious page that exploits the vulnerability of the browser and that executes malicious code. To prevent this attack, some methods have been devised such as... 详细信息
来源: 评论
An efficient network intrusion detection
收藏 引用
COMPUTER COMMUNICATIONS 2010年 第4期33卷 477-484页
作者: Chen, Chia-Mei Chen, Ya-Lin Lin, Hsiao-Chung Natl Sun Yat Sen Univ Dept Informat Management Kaohsiung 80424 Taiwan
exploit code based on system vulnerability is often used by attacker. Such exploit program often sends attack packets in the first few packets. A Lightweight Network intrusion Detection system (LNID) is proposed for d... 详细信息
来源: 评论
Externally verifiable code execution
收藏 引用
COMMUNICATIONS OF THE ACM 2006年 第9期49卷 45-49页
作者: Seshadri, Arvind Luk, Mark Perrig, Adrian Van Doorn, Leendert Khosla, Pradeep Carnegie Mellon Univ Dept Elect & Comp Engn Pittsburgh PA 15213 USA Carnegie Mellon Univ CyLab Pittsburgh PA 15213 USA IBM Corp Thomas J Watson Res Ctr Secure Syst & Tools Dept Yorktown Hts NY 10598 USA Carnegie Mellon Univ Carnegie Inst Technol Pittsburgh PA 15213 USA
Computing devices are routinely targeted by a wide variety of mal-ware, suchas spyware, trojans, rootkits, and viruses. The presence of exploitable vulnerabilities in systemsoftware, and the widespread availability of... 详细信息
来源: 评论
Sparsity-based MIMO Noise Radar for Multiple Target Estimation
Sparsity-based MIMO Noise Radar for Multiple Target Estimati...
收藏 引用
IEEE 7th Sensor Array and Multichannel Signal Processing Workshop (SAM)
作者: Gogineni, Sandeep Nehorai, Arye Washington Univ Preston M Green Dept Elect & Syst Engn St Louis MO 63130 USA
We solve a multiple moving-target estimation problem using a colocated multiple-input multiple-output (MIMO) radar system. Each antenna of the radar array transmits noise waveforms to achieve high resolution. These wa... 详细信息
来源: 评论
Identifying and Categorizing Malicious Content on Paste Sites: A Neural Topic Modeling Approach  19
Identifying and Categorizing Malicious Content on Paste Site...
收藏 引用
19th Annual IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
作者: Vahedi, Tala Ampel, Benjamin Samtani, Sagar Chen, Hsinchun Univ Arizona Dept Management Informat Syst Tucson AZ 85721 USA Indiana Univ Dept Operat & Decis Technol Bloomington IN USA
Malicious cyber activities impose substantial costs on the U.S. economy and global markets. Cyber-criminals often use information-sharing social media platforms such as paste sites (e.g., Pastebin) to share vast amoun... 详细信息
来源: 评论
AN AUTOMATIC, PROMPT, AND ACCURATE exploit-BASED METHOD TO GENERATE POLYMORPHIC WORM'S SIGNATURE
AN AUTOMATIC, PROMPT, AND ACCURATE EXPLOIT-BASED METHOD TO G...
收藏 引用
4th IEEE International Conference on Broadband Network and Multimedia Technology (IEEE IC-BNMT 2011)
作者: Ramadass, Sureswaran Abdulla, Shubair A. Altyeb, Altyeb Altaher Univ Sains Malaysia Ctr Excellence NAV6 George Town 11800 Malaysia
Polymorphic worms evade network security systems by varying their payload every time an infection is attempted. The payload's variation operation is performed by using built-in self content encryptor. However, all... 详细信息
来源: 评论
AN AUTOMATIC,PROMPT,AND ACCURATE exploit-BASED METHOD TO GENERATE POLYMORPHIC WORM'S SIGNATURE
AN AUTOMATIC,PROMPT,AND ACCURATE EXPLOIT-BASED METHOD TO GEN...
收藏 引用
2011 4th IEEE International Conference on Broadband Network and Multimedia Technology
作者: Sureswaran Ramadass Shubair A.Abdulla Altyeb Altaher Altyeb NAV6 Center of Excellence Universiti Sains Malaysia USM11800 PenangMalaysia
Polymorphic worms evade network security systems by varying their payload every time an infection is *** payload's variation operation is performed by using built-in self content ***,all encrypted payloads share t... 详细信息
来源: 评论