Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Ata de Congresso
|
![]() |
ContractFuzzer: fuzzing smart contracts for vulnerability detectionJiang, Bo ; Liu, Ye ; Chan, W. K.2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE), 2018, p.259-269New York, NY, USA: ACMTexto completo disponível |
2 |
Material Type: Ata de Congresso
|
![]() |
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential AnalysisZheng, Yunhui ; Pujar, Saurabh ; Lewis, Burn ; Buratti, Luca ; Epstein, Edward ; Yang, Bo ; Laredo, Jim ; Morari, Alessandro ; Su, Zhong2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP), 2021, p.111-120IEEETexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Sharing of vulnerability information among companies - a survey of Swedish companiesOlsson, Thomas ; Hell, Martin ; Höst, Martin ; Franke, Ulrik ; Borg, MarkusEuromicro Conference on Software Engineering and Advanced Applications (SEAA),Kallithea-Chalkidik, Greece,2019-08-28 - 2019-08-30, 2019, p.284Texto completo disponível |
4 |
Material Type: Ata de Congresso
|
![]() |
Chucky: exposing missing checks in source code for vulnerability discoveryYamaguchi, Fabian ; Wressnegger, Christian ; Gascon, Hugo ; Rieck, KonradProceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 2013, p.499-510New York, NY, USA: ACMTexto completo disponível |
5 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Against Internet Disruptions – A Graph-Based PerspectiveBaumann, Annika ; Fabian, BenjaminCritical Information Infrastructures Security, p.120-131 [Periódico revisado por pares]Cham: Springer International PublishingTexto completo disponível |
6 |
Material Type: Ata de Congresso
|
![]() |
A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding RuntimesVan Bulck, Jo ; Oswald, David ; Marin, Eduard ; Aldoseri, Abdulla ; Garcia, Flavio D. ; Piessens, FrankProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, p.1741-1758New York, NY, USA: ACMTexto completo disponível |
7 |
Material Type: Ata de Congresso
|
![]() |
Static detection of cross-site scripting vulnerabilitiesWassermann, Gary ; Su, Zhendong2008 ACM/IEEE 30th International Conference on Software Engineering, 2008, Vol.2008 (24), p.171-180New York, NY, USA: ACMTexto completo disponível |
8 |
Material Type: Ata de Congresso
|
![]() |
COASTAL VULNERABILITY INDEX DEVELOPMENT: A REVIEWHamid, A. I. A. ; Din, A. H. M. ; Yusof, N. ; Abdullah, N. M. ; Omar, A. H. ; Abdul Khanan, M. F.International archives of the photogrammetry, remote sensing and spatial information sciences., 2019, Vol.XLII-4/W16, p.229-235 [Periódico revisado por pares]Gottingen: Copernicus GmbHTexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android ApplicationsZhan, Xian ; Fan, Lingling ; Chen, Sen ; We, Feng ; Liu, Tianming ; Luo, Xiapu ; Liu, Yang2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE), 2021, p.1695-1707IEEETexto completo disponível |
10 |
Material Type: Ata de Congresso
|
![]() |
Vulnerability Categorization for Fast Multistep Attack ModellingLevshun, Dmitry ; Chechulin, Andrey2023 33rd Conference of Open Innovations Association (FRUCT), 2023, Vol.33 (1), p.169-175 [Periódico revisado por pares]FRUCTTexto completo disponível |