Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Doupe, Adam"'
Autor:
Mei, Xiang, Singaria, Pulkit Singh, Del Castillo, Jordi, Xi, Haoran, Abdelouahab, Benchikh, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam, Pearce, Hammond, Dolan-Gavitt, Brendan
High-quality datasets of real-world vulnerabilities are enormously valuable for downstream research in software security, but existing datasets are typically small, require extensive manual effort to update, and are missing crucial features that such
Externí odkaz:
http://arxiv.org/abs/2408.02153
Autor:
Guo, Ziyi, Le, Dang K, Lin, Zhenpeng, Zeng, Kyle, Wang, Ruoyu, Bao, Tiffany, Shoshitaishvili, Yan, Doupé, Adam, Xing, Xinyu
Recently, a novel method known as Page Spray emerges, focusing on page-level exploitation for kernel vulnerabilities. Despite the advantages it offers in terms of exploitability, stability, and compatibility, comprehensive research on Page Spray rema
Externí odkaz:
http://arxiv.org/abs/2406.02624
Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to s
Externí odkaz:
http://arxiv.org/abs/2210.15011
Autor:
Kalantari, Faezeh, Zaeifi, Mehrnoosh, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam
Cross-site scripting (XSS) is the most common vulnerability class in web applications over the last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection in
Externí odkaz:
http://arxiv.org/abs/2204.08592
Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation
Vulnerabilities are challenging to locate and repair, especially when source code is unavailable and binary patching is required. Manual methods are time-consuming, require significant expertise, and do not scale to the rate at which new vulnerabilit
Externí odkaz:
http://arxiv.org/abs/2202.12336
Autor:
Schrom, Edward, Kinzig, Ann, Forrest, Stephanie, Graham, Andrea L., Levin, Simon A., Bergstrom, Carl T., Castillo-Chavez, Carlos, Collins, James P., de Boer, Rob J., Doupé, Adam, Ensafi, Roya, Feldman, Stuart, Halderman, Bryan T. Grenfell. Alex, Huijben, Silvie, Maley, Carlo, Mosesr, Melanie, Perelson, Alan S., Perrings, Charles, Plotkin, Joshua, Rexford, Jennifer, Tiwari, Mohit
We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying
Externí odkaz:
http://arxiv.org/abs/2107.10344
Autor:
Bitaab, Marzieh, Cho, Haehyun, Oest, Adam, Zhang, Penghui, Sun, Zhibo, Pourmohamad, Rana, Kim, Doowon, Bao, Tiffany, Wang, Ruoyu, Shoshitaishvili, Yan, Doupé, Adam, Ahn, Gail-Joon
As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measu
Externí odkaz:
http://arxiv.org/abs/2103.12843
SQL injection (SQLi) attacks pose a significant threat to the security of web applications. Existing approaches do not support object-oriented programming that renders these approaches unable to protect the real-world web apps such as Wordpress, Joom
Externí odkaz:
http://arxiv.org/abs/2006.11996
Autor:
Sengupta, Sailik, Vadlamudi, Satya Gautam, Kambhampati, Subbarao, Taguinod, Marthony, Doupé, Adam, Zhao, Ziming, Ahn, Gail-Joon
The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an e
Externí odkaz:
http://arxiv.org/abs/1602.07024
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.