Detect Compiler Inserted Run-time Security Checks in Binary Software

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ISPEC (17. : 2022 : Taipeh) Information security practice and experience
1. Verfasser: Pramanick, Koyel (VerfasserIn)
Weitere Verfasser: Kulkarni, Prasad A. (VerfasserIn)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Sherlock Holmes Zero-Knowledge Protocols 2022 Teşeleanu, George
A CNN-Based Semi-supervised Learning Approach for the Detection of SS7 Attacks 2022 Ermis, Orhan
Preventing Adversarial Attacks Against Deep Learning-Based Intrusion Detection System 2022 Nguyen, Xuan-Ha
Evaluating the Possibility of Evasion Attacks to Machine Learning-Based Models for Malicious PowerShell Detection 2022 Mezawa, Yuki
Using API Calls for Sequence-Pattern Feature Mining-Based Malware Detection 2022 Balan, Gheorghe
LMGROUP: A Lightweight Multicast Group Key Management for IoT Networks 2022 Nikbakht Bideh, Pegah
Robust Anomaly Detection via Radio Fingerprinting in LoRa-Enabled IIoT 2022 Halder, Subir
Continued Fractions Applied to a Family of RSA-like Cryptosystems 2022 Cotan, Paul
Practical Backdoor Attack Against Speaker Recognition System 2022 Luo, Yuxiao
A New Scalable Mutual Authentication in Fog-Edge Drone Swarm Environment 2022 Han, Kyusuk
Blockchain-Based Multi-keyword Search on Encrypted COVID-19 Contact Tracing Data 2022 Ng, Zheng Yao
Designing Enhanced Robust 6G Connection Strategy with Blockchain 2022 Thomsen, August Lykke
Blockchain-Based Confidential Payment System with Controllable Regulation 2022 Liao, Yu-Chen
Towards Blockchain-Enabled Intrusion Detection for Vehicular Navigation Map System 2022 Bodi, Bodi
Optimal Generic Attack Against Basic Boneh-Boyen Signatures 2022 Fu, Yen-Kang
Physical Zero-Knowledge Proof Protocol for Topswops 2022 Komano, Yuichi
Secure Human Identification Protocol with Human-Computable Passwords 2022 Matelski, Sławomir
Techniques for Continuous Touch-Based Authentication 2022 Georgiev, Martin
Federated Intrusion Detection on Non-IID Data for IIoT Networks Using Generative Adversarial Networks and Reinforcement Learning 2022 Quyen, Nguyen Huu
Detection of MSOffice-Embedded Malware: Feature Mining and Short- vs. Long-Term Performance 2022 Viţel, Silviu
Alle Artikel auflisten