Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Hiser, Jason D."'
Zipr is a tool for static binary rewriting, first published in 2016. Zipr was engineered to support arbitrary program modification with an emphasis on low overhead, robustness, and flexibility to perform security enhancements and instrumentation. Ori
Externí odkaz:
http://arxiv.org/abs/2312.00714
The open-source Helix++ project improves the security posture of computing platforms by applying cutting-edge cybersecurity techniques to diversify and harden software automatically. A distinguishing feature of Helix++ is that it does not require sou
Externí odkaz:
http://arxiv.org/abs/2304.04846
Coverage-guided fuzzing's aggressive, high-volume testing has helped reveal tens of thousands of software security flaws. While executing billions of test cases mandates fast code coverage tracing, the nature of binary-only targets leads to reduced t
Externí odkaz:
http://arxiv.org/abs/2209.03441
Autor:
Buchanan, Molly, Collyer, Jeffrey W., Davidson, Jack W., Dey, Saikat, Gardner, Mark, Hiser, Jason D., Lang, Jeffry, Nottingham, Alastair, Oprea, Alina
Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be
Externí odkaz:
http://arxiv.org/abs/2104.10034
Autor:
Hiser, Jason D.
Thesis (Ph. D.)--University of Virginia, 2005.
Includes bibliographical references (leaves 93-99). Also available online through Digital Dissertations.
Includes bibliographical references (leaves 93-99). Also available online through Digital Dissertations.
Externí odkaz:
http://wwwlib.umi.com/dissertations/fullcit/3169653
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
ACM Transactions on Software Engineering & Methodology; Jun2019, Vol. 28 Issue 3, p126-138, 13p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Nguyen-Tuong, Anh, Melski, David, Davidson, Jack W., Co, Michele, Hawkins, William, Hiser, Jason D., Morris, Derek, Nguyen, Ducson, Rizzi, Eric
Publikováno v:
IEEE Security & Privacy; Feb2018, Vol. 16 Issue 2, p42-51, 10p
Autor:
Co, Michele, Davidson, Jack W., Hiser, Jason D., Knight, John C., Nguyen-Tuong, Anh, Weimer, Westley, Burket, Jonathan, Frazier, Gregory L., Frazier, Tiffany M., Dutertre, Bruno, Mason, Ian, Shankar, Natarajan, Forrest, Stephanie
Publikováno v:
ACM International Conference Proceeding Series; 4/5/2016, p1-4, 4p