• Stranger

  • Referenced in 16 articles [sw09152]
  • string expressions can take during program execution. Stranger can automatically (1) prove that an application ... generate vulnerability signatures that characterize all malicious inputs that can be used to generate attacks...
  • BitBlaze

  • Referenced in 11 articles [sw10059]
  • analyzing and defending against the myriad of malicious code, where source code is unavailable ... ground truth about program behavior since computers execute binaries (executables), not source code. However, binary ... analyzing even benign binaries, let alone potentially malicious binaries. Thus, we need to develop tools...
  • EMBER

  • Referenced in 1 article [sw38336]
  • learning models to statically detect malicious Windows portable executable files. The dataset includes features extracted ... binary files: 900K training samples (300K malicious, 300K benign, 300K unlabeled) and 200K test samples...
  • CryptDB

  • Referenced in 16 articles [sw27061]
  • private data, and because curious or malicious administrators may capture and leak data. CryptDB ... backed by SQL databases. It works by executing SQL queries over encrypted data using...
  • TTAnalyze

  • Referenced in 6 articles [sw18511]
  • able to develop effective detection techniques for malicious code. In addition, it is an important ... dynamically analyzing the behavior of Windows executables. To this end, the binary ... does not modify the program that it executes (e.g., through API call hooking or breakpoints ... making it more difficult to detect by malicious code. Also, our tool runs binaries...
  • Flicker

  • Referenced in 9 articles [sw22637]
  • meaningful, fine-grained attestation of the code executed (as well as its inputs and outputs ... enabled devices are all malicious. Flicker leverages new commodity processors from AMD and Intel...
  • AndroidCubo

  • Referenced in 0 articles [sw33513]
  • techniques to gain detailed understanding of executable for malicious purposes, such as re-packaging...
  • Mir

  • Referenced in 1 article [sw35823]
  • large-scale software systems. However, they often execute with significantly more privilege than needed ... actively malicious. Mir addresses this problem by introducing a fine-grained read-write-execute...
  • RAppArmor

  • Referenced in 1 article [sw22048]
  • execution environment of R is entirely unrestricted, which could result in malicious behavior or excessive...
  • AMNESIA

  • Referenced in 11 articles [sw12039]
  • detect illegal queries before they are executed on the database. In its static part ... large number of both legitimate and malicious inputs and measured how many attacks our technique...
  • SEEAD

  • Referenced in 1 article [sw31769]
  • code coverage as not all software execution paths and behavior will be exposed at specific ... these approaches often fail to discover hidden malicious patterns. This paper introduces SEEAD, a novel ... SEEAD dynamically directs the target program to execute different paths across different runs. This dynamic ... code coverage enables us to uncover hidden malicious behaviors that are not detected by traditional...
  • AnZenMail

  • Referenced in 3 articles [sw06211]
  • order that they could survive recent malicious attacks such as server-cracking and e-mail ... designed to provide a support for secure execution of mobile code arriving as e-mail...
  • ADEPTS

  • Referenced in 3 articles [sw22315]
  • commerce systems, are suitable targets for malicious attacks because of the potential financial impact. Compared ... alerts from an intrusion detection framework, ADEPTS executes algorithms to determine the spread...
  • Diogenes

  • Referenced in 3 articles [sw30238]
  • with compliant contracts can interact, and their execution is monitored to detect and sanction contract ... presence of failures (whether accidental or malicious) of the context. In this paper we present...
  • MoTE-ECC

  • Referenced in 2 articles [sw09247]
  • susceptible to a wide range of malicious attacks, which has stimulated a body of research ... various trade-offs between security and execution time (resp. energy consumption). OPFs are a special...
  • CoChecker

  • Referenced in 1 article [sw13316]
  • component chains in android. Studies show that malicious applications can obtain sensitive data from ... build a call graph to model the execution of multiple entry points in a component...
  • MAWS

  • Referenced in 1 article [sw01354]
  • migrate between Web services-enabled hosts, and execute at the destination hosts through invocation ... suggests ways for protecting it from malicious hosts as well as guarding hosts from malicious...
  • SVMlight

  • Referenced in 264 articles [sw04076]
  • Description (homepage): SVMlight is an implementation of Vapnik...
  • CPLEX

  • Referenced in 2773 articles [sw04082]
  • IBM® ILOG® CPLEX® offers C, C++, Java, .NET...
  • LIBSVM

  • Referenced in 1185 articles [sw04879]
  • LIBSVM is a library for Support Vector Machines...