Introduction
Fuzzing-学习资源汇总
污点分析-学习资源汇总
符号执行-学习资源汇总
恶意样本检测-学习资源汇总
逆向工程-学习资源汇总
工作面试复习资料汇总
信息安全相关会议期刊汇总
Paper
<> AutomatedExploit
HEAPHOPPER Bringing Bounded Model Checking to Heap Implementation Security
<> Fuzzing
Angora: Efficient Fuzzing by Principled Search
Automated Detection Exploitation and Elimination of Double-Fetch Bugs Using Modern CPU Features
Check It Again: Detecting Lacking-Recheck Bugs in OS Kernels
Digtool: A Virtualization-Based Framework for Detecting Kernel Vulnerabilities
Enforcing Unique Code Target Property for Control-Flow Integrity
Fuzzing: Art, Science, and Engineering
NAR-Miner Discovering Negative Association Rules from Code
SoK: Security Evaluation of Home-Based IoT Deployments
Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking With Orders-of-Magnitude Performance Boost
Using Logic Programming to Recover C++ Classes and Methods From Compiled Executables
VUzzer: Application-aware Evolutionary Fuzzing
From automation to intelligence Survey of research on vulnerability discovery techniques
NEUZZ Efficient FuzzinG with Neural Program Smoothing
HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations
A Reinforcement Learning Based Approach to Automated Testing of Android Applications
Skyfire: Data-Driven Seed Generation for Fuzzing
Learn to Accelerate Identifying New Test Cases in Fuzzing
Improving Fitness Function for Language Fuzzing with PCFG Model
ExploitMeter: Combining Fuzzing with Machine Learning for Automated Evaluation of Software Exploitability
Experimenting machine learning techniques to predict vulnerabilities
A Review of Machine Learning in Software Vulnerability Research
Sofware Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques: A Survey
A Survey on Source Code Review Using Machine Learning
<> MaliciousSampleDetecion
Capturing the symptoms of malicious code in electronic documents by file's entropy signal combined with Machine learning
<> ReverseEngineering
Lord-of-the-X86-Rings-A-Portable-User-Mode-Privilege-Separation-Architecture-on-X86
Superset-Disassembly-Statically-Rewriting-X86-Binaries-Without-Heuristics-Disassembly
<> SymbolicExecution
<> TaintAnalysis
database
Published with GitBook
<> TaintAnalysis
论文目录
2019年
综述
研究性工作
2018年
综述
研究性工作
test*
2017年
综述
研究性工作
2016年
综述
研究性工作
2015年
综述
研究性工作
results matching "
"
No results matching "
"