• CSSV

  • Referenced in 20 articles [sw13701]
  • programs yielding vulnerabilities which are exploited by software viruses. We present C String Static Verifyer ... reported, thereby proving that statically reducing software vulnerability is achievable. CSSV handles large programs...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • Analyzer. To determine the security impact software vulnerabilities have on a particular network, one must ... bugs reported in OVAL, a formal vulnerability definition language. We tested our tool ... detected a policy violation caused by software vulnerabilities and the system administrators took remediation measures...
  • McEliece

  • Referenced in 264 articles [sw02076]
  • Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem ... storage space of these platforms. Therefore, their vulnerability and robustness against physical attacks, e.g., state...
  • VulDeePecker

  • Referenced in 3 articles [sw36365]
  • Vulnerability Detection. The automatic detection of software vulnerabilities is an important research problem. However, existing ... learning to vulnerability detection. In particular, we need to find representations of software programs that ... implementation of a deep learning-based vulnerability detection system, called Vulnerability Deep Pecker (VulDeePecker ... software products (namely Xen, Seamonkey, and Libav) and detect 4 vulnerabilities, which are not reported...
  • LIFT

  • Referenced in 3 articles [sw20596]
  • Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking ... overheads. This paper proposes a low overhead, software-only information flow tracking system, called LIFT...
  • SwordDTA

  • Referenced in 1 article [sw17035]
  • dynamic taint analysis tool for software vulnerability detection. Software vulnerabilities are the root cause ... technique to detect software vulnerabilities, we present SwordDTA, a tool that can perform dynamic taint ... used to detect software vulnerabilities with vulnerability modeling and taint check. We evaluate it with ... detecting at least four kinds of software vulnerabilities including buffer overflow, integer overflow, division...
  • CryptDB

  • Referenced in 16 articles [sw27061]
  • applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs...
  • MOPS

  • Referenced in 23 articles [sw10117]
  • approach for finding bugs in security-relevant software and verifying their absence. The idea ... verifying the absence of certain classes of vulnerabilities, that it is fully interprocedural, and that...
  • Fortify

  • Referenced in 1 article [sw26890]
  • Source Code Analysis to Remove Security Vulnerabilities in Java Socket Programs: A Case Study. This ... solutions to remove five important software security vulnerabilities, which if left unattended could severely impact ... running the software and also the network hosting the server. The five vulnerabilities we study ... suitably modified to correct any such vulnerabilities in software developed in any other programming language...
  • GARNET

  • Referenced in 1 article [sw22308]
  • attacks, following recommendations to patch software vulnerabilities, and changing the attacker starting location to analyze...
  • BadNets

  • Referenced in 4 articles [sw41281]
  • BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain. Deep learning-based techniques have ... have developed tools for verifying and debugging software...
  • NVD

  • Referenced in 5 articles [sw15083]
  • vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software...
  • Devign

  • Referenced in 3 articles [sw40145]
  • Graph Neural Networks. Vulnerability identification is crucial to protect the software systems from attacks...
  • IRIS

  • Referenced in 13 articles [sw19373]
  • available law enforcement agents introduces predictable vulnerabilities that can be exploited by adversaries. Strategic randomization ... Intelligent Randomization In Scheduling (IRIS) system, a software scheduling assistant for the Federal Air Marshals...
  • Taintscope

  • Referenced in 0 articles [sw23360]
  • Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection. Fuzz testing has proven successful...
  • BackFlow

  • Referenced in 1 article [sw34336]
  • widely applied to detect injection vulnerabilities in real world software. A main drawback of static...
  • Salus

  • Referenced in 1 article [sw35842]
  • critical tasks. The software used to perform these tasks is often vulnerable to attacks ... application itself or in included software libraries. Recent work proposes the isolation of security-sensitive ... callees, the impact of unsafe interfaces and vulnerable compartments is significantly reduced. We describe...
  • i*

  • Referenced in 15 articles [sw04447]
  • give rise to opportunities as well as vulnerabilities. Networks of dependencies are analyzed using ... technology, and the design of agent-based software systems. The name i* (pronounced eye-star...
  • MemShield

  • Referenced in 1 article [sw37367]
  • MemShield: GPU-assisted software memory encryption. Cryptographic algorithm implementations are vulnerable to Cold Boot attacks...
  • BFF

  • Referenced in 1 article [sw15086]
  • software vendors and security researchers to efficiently discover and analyze security vulnerabilities found via fuzzing...