Zobrazeno 1 - 10
of 66
pro vyhledávání: '"Hiser, Jason"'
Zipr is a tool for static binary rewriting, first published in 2016. Zipr was engineered to support arbitrary program modification with an emphasis on low overhead, robustness, and flexibility to perform security enhancements and instrumentation. Ori
Externí odkaz:
http://arxiv.org/abs/2312.00714
The open-source Helix++ project improves the security posture of computing platforms by applying cutting-edge cybersecurity techniques to diversify and harden software automatically. A distinguishing feature of Helix++ is that it does not require sou
Externí odkaz:
http://arxiv.org/abs/2304.04846
Coverage-guided fuzzing's aggressive, high-volume testing has helped reveal tens of thousands of software security flaws. While executing billions of test cases mandates fast code coverage tracing, the nature of binary-only targets leads to reduced t
Externí odkaz:
http://arxiv.org/abs/2209.03441
The cyber-threat landscape has evolved tremendously in recent years, with new threat variants emerging daily, and large-scale coordinated campaigns becoming more prevalent. In this study, we propose CELEST (CollaborativE LEarning for Scalable Threat
Externí odkaz:
http://arxiv.org/abs/2205.11459
Autor:
Ongun, Talha, Spohngellert, Oliver, Miller, Benjamin, Boboila, Simona, Oprea, Alina, Eliassi-Rad, Tina, Hiser, Jason, Nottingham, Alastair, Davidson, Jack, Veeraraghavan, Malathi
Recent self-propagating malware (SPM) campaigns compromised hundred of thousands of victim machines on the Internet. It is challenging to detect these attacks in their early stages, as adversaries utilize common network services, use novel techniques
Externí odkaz:
http://arxiv.org/abs/2112.13798
Autor:
Ongun, Talha, Boboila, Simona, Oprea, Alina, Eliassi-Rad, Tina, Nottingham, Alastair, Hiser, Jason, Davidson, Jack
Recently, coordinated attack campaigns started to become more widespread on the Internet. In May 2017, WannaCry infected more than 300,000 machines in 150 countries in a few days and had a large impact on critical infrastructure. Existing threat shar
Externí odkaz:
http://arxiv.org/abs/2104.11636
Autor:
Buchanan, Molly, Collyer, Jeffrey W., Davidson, Jack W., Dey, Saikat, Gardner, Mark, Hiser, Jason D., Lang, Jeffry, Nottingham, Alastair, Oprea, Alina
Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be
Externí odkaz:
http://arxiv.org/abs/2104.10034
Autor:
Hiser, Jason D.
Thesis (Ph. D.)--University of Virginia, 2005.
Includes bibliographical references (leaves 93-99). Also available online through Digital Dissertations.
Includes bibliographical references (leaves 93-99). Also available online through Digital Dissertations.
Externí odkaz:
http://wwwlib.umi.com/dissertations/fullcit/3169653
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ACM Transactions on Software Engineering & Methodology; Jun2019, Vol. 28 Issue 3, p126-138, 13p