Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 37 matches
- 2023
- Yu Wang, Yipeng Zhang, Zhoujun Li:
AAHEG: Automatic Advanced Heap Exploit Generation Based on Abstract Syntax Tree. Symmetry 15(12): 2197 (2023) - Yu Wang, Zhoujun Li, Yipeng Zhang, You Zhai:
IoTAEG: Automatic Exploit Generation of IoT Devices. ICCEIC 2023: 610-619 - Peng Xu, Liangze Yin, Jiantong Ma, Dong Yang, Wei Dong:
FAEG: Feature-Driven Automatic Exploit Generation. Internetware 2023: 165-173 - 2022
- T. J. OConnor, Carl Mann, Tiffanie Petersen, Isaiah Thomas, Christopher Stricklan:
Toward an Automatic Exploit Generation Competition for an Undergraduate Binary Reverse Engineering Course. ITiCSE (1) 2022: 442-448 - Nan-Jung Huang, Chih-Jen Huang, Shih-Kun Huang:
Pain Pickle: Bypassing Python Restricted Unpickler for Automatic Exploit Generation. QRS 2022: 1079-1090 - Bin Zhang, Fenglei Deng:
Tetris: Automatic UAF Exploit Generation by Manipulating Layout based on Reactivated Paths. SNPD-Summer 2022: 1-8 - Sunnyeo Park, Daejun Kim, Suman Jana, Sooel Son:
FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities. USENIX Security Symposium 2022: 197-214 - 2021
- Xiyu Kang, Saumya Debray:
A Framework for Automatic Exploit Generation for JIT Compilers. Checkmate@CCS 2021: 11-19 - Bramwell Brizendine, Austin Babcock:
A Novel Method for the Automatic Generation of JOP Chain Exploits. NCS 2021: 77-92 - Jan Christian Blaise Cruz, Jose Kristian Resabal, James Lin, Dan John Velasco, Charibeth Cheng:
Exploiting News Article Structure for Automatic Corpus Generation of Entailment Datasets. PRICAI (2) 2021: 86-99 - 2020
- Zixuan Zhao, Yan Wang, Xiaorui Gong:
HAEPG: An Automatic Multi-hop Exploitation Generation Framework. DIMVA 2020: 89-109 - 2019
- Gun-Woo Kim, Dong-Ho Lee:
Intelligent Health Diagnosis Technique Exploiting Automatic Ontology Generation and Web-Based Personal Health Record Services. IEEE Access 7: 9419-9444 (2019) - Hao Fang, Lifa Wu, Zhiyong Wu:
基于符号执行的Return-to-dl-resolve利用代码自动生成方法 (Automatic Return-to-dl-resolve Exploit Generation Method Based on Symbolic Execution). 计算机科学 46(2): 127-132 (2019) - Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel C. Briand:
Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications. IEEE Trans. Software Eng. 45(4): 335-362 (2019) - Mingsong Zhou, Fanping Zeng, Yu Zhang, Chengcheng Lv, Zhao Chen, Guozhu Chen:
Automatic Generation of Capability Leaks' Exploits for Android Applications. ICST Workshops 2019: 291-295 - 2018
- Óscar Alcón, Elena Lloret:
SemPCA-Summarizer: Exploiting Semantic Principal Component Analysis for Automatic Summary Generation. Comput. Informatics 37(5): 1126-1148 (2018) - Daniel A. Ashlock, Joseph Alexander Brown, Lolita Sultanaeva:
Exploiting Fertility to Enable Automatic Content Generation to Ameliorate User Fatigue in Interactive Evolutionary Computation. CEC 2018: 1-7 - Luhang Xu, Weixi Jia, Wei Dong, Yongjun Li:
Automatic Exploit Generation for Buffer Overflow Vulnerabilities. QRS Companion 2018: 463-468 - 2017
- Shansong Yang, Weiming Lu, Dezhi Yang, Xi Li, Chao Wu, Baogang Wei:
KeyphraseDS: Automatic generation of survey by exploiting keyphrase information. Neurocomputing 224: 58-70 (2017) - Wei You, Peiyuan Zong, Kai Chen, XiaoFeng Wang, Xiaojing Liao, Pan Bian, Bin Liang:
SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits. CCS 2017: 2139-2154 - Ivana Zinno, Manuela Bonano, Sabatino Buonanno, Francesco Casu, Claudio De Luca, Adele Fusco, Riccardo Lanari, Michele Manunta, Mariarosaria Manzo, Antonio Pepe:
Sentinel-1 data exploitation for automatic surface deformation time-series generation through the SBAS-DInSAR parallel processing chain. IGARSS 2017: 5529-5532 - Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek:
Automatic generation of inter-component communication exploits for Android applications. ESEC/SIGSOFT FSE 2017: 661-671 - 2016
- Yu-Lun Hsieh, Shih-Hung Liu, Kuan-Yu Chen, Hsin-Min Wang, Wen-Lian Hsu, Berlin Chen:
運用序列到序列生成架構於重寫式自動摘要(Exploiting Sequence-to-Sequence Generation Framework for Automatic Abstractive Summarization)[In Chinese]. ROCLING 2016 - 2015
- Hong Hu, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang:
Automatic Generation of Data-Oriented Exploits. USENIX Security Symposium 2015: 177-192 - 2014
- Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley:
Automatic exploit generation. Commun. ACM 57(2): 74-84 (2014) - Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, Chung-Wei Lai:
Software Crash Analysis for Automatic Exploit Generation on Binary Programs. IEEE Trans. Reliab. 63(1): 270-289 (2014) - Domenico Amalfitano, Nicola Amatucci, Anna Rita Fasolino, Ugo Gentile, Gianluca Mele, Roberto Nardone, Valeria Vittorini, Stefano Marrone:
Improving code coverage in android apps testing by exploiting patterns and automatic test case generation. WISE@ASE 2014: 29-34 - 2013
- Xiao Bai, Flavio Paiva Junqueira, Srinivasan H. Sengamedu:
Exploiting user clicks for automatic seed set generation for entity matching. KDD 2013: 980-988 - Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng:
Automatic Polymorphic Exploit Generation for Software Vulnerabilities. SecureComm 2013: 216-233 - 2012
- Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Chung-Wei Lai, Han-Lin Lu, Wai-Meng Leong:
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. SERE 2012: 78-87
skipping 7 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-23 09:59 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint