• McEliece

  • Referenced in 251 articles [sw02076]
  • storage space of these platforms. Therefore, their vulnerability and robustness against physical attacks, e.g., state...
  • Trivium

  • Referenced in 79 articles [sw06150]
  • simple designs are more likely to be vulnerable to simple, and possibly devastating, attacks (which...
  • MOPS

  • Referenced in 23 articles [sw10117]
  • verifying the absence of certain classes of vulnerabilities, that it is fully interprocedural, and that ... finding a wide range of security vulnerabilities in large programs efficiently...
  • CSSV

  • Referenced in 20 articles [sw13701]
  • software defects in C programs yielding vulnerabilities which are exploited by software viruses. We present ... reported, thereby proving that statically reducing software vulnerability is achievable. CSSV handles large programs...
  • Stranger

  • Referenced in 16 articles [sw09152]
  • finding and eliminating string-related security vulnerabilities in PHP applications. Stranger uses symbolic forward ... free from specified attacks or (2) generate vulnerability signatures that characterize all malicious inputs that...
  • Saner

  • Referenced in 9 articles [sw37817]
  • skills, and, as a result, they contain vulnerabilities. Most of these vulnerabilities stem from ... prior to their use. Past research on vulnerability analysis has mostly focused on identifying cases ... sanitization routine to potentially malicious input, the vulnerability analysis assumes that the result is innocuous ... were able to identify several novel vulnerabilities that stem from erroneous sanitization procedures...
  • MulVAL

  • Referenced in 8 articles [sw17743]
  • Analyzer. To determine the security impact software vulnerabilities have on a particular network, one must ... interactions among multiple network elements. For a vulnerability analysis tool to be useful in practice ... must be able to automatically integrate formal vulnerability specifications from the bug-reporting community. Second ... reasoning system that conducts multihost, multistage vulnerability analysis on a network. MulVAL adopts Datalog...
  • CryptDB

  • Referenced in 16 articles [sw27061]
  • Online applications are vulnerable to theft of sensitive information because adversaries can exploit software bugs...
  • i*

  • Referenced in 15 articles [sw04447]
  • give rise to opportunities as well as vulnerabilities. Networks of dependencies are analyzed using...
  • tlmec

  • Referenced in 15 articles [sw11119]
  • residual errors, such assumptions make inferences vulnerable to outliers. The sensitivity to outliers...
  • IRIS

  • Referenced in 13 articles [sw19373]
  • available law enforcement agents introduces predictable vulnerabilities that can be exploited by adversaries. Strategic randomization...
  • S3

  • Referenced in 9 articles [sw19495]
  • symbolic string solver for vulnerability detection in web applications. Motivated by the vulnerability analysis...
  • Pixy

  • Referenced in 5 articles [sw25249]
  • static analysis tool for detecting web application vulnerabilities. The number and the importance ... time, the quantity and impact of security vulnerabilities in such applications have grown as well ... this paper, we address the problem of vulnerable Web applications by means of static source ... context-sensitive dataflow analysis to discover vulnerable points in a program. In addition, alias...
  • Merlin

  • Referenced in 5 articles [sw23076]
  • increase in the number of vulnerabilities such as cross-site scripting and SQL injection ... fact, these explicit information flow vulnerabilities commonly found in Web applications now outnumber vulnerabilities such ... Tools checking for these vulnerabilities require a specification to operate. In most cases the task ... easy to miss, leading to missed vulnerabilities; similarly, incorrect specifications may lead to false positives...
  • NVD

  • Referenced in 5 articles [sw15083]
  • National Vulnerability Database. NVD is the U.S. government repository of standards based vulnerability management data ... Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes...
  • WAPTEC

  • Referenced in 5 articles [sw21854]
  • designed to automatically identify parameter tampering vulnerabilities and generate exploits by construction to demonstrate those ... vulnerabilities. WAPTEC involves a new approach to whitebox analysis of the server’s code ... open source applications and found previously unknown vulnerabilities in every single one of them...
  • MagNet

  • Referenced in 5 articles [sw41285]
  • deep learning systems are found to be vulnerable to small adversarial perturbations that are nearly ... incorrect decisions, with potentially disastrous consequences. These vulnerabilities hinder the deployment of deep learning systems...
  • DIALIGN-TX

  • Referenced in 7 articles [sw12751]
  • sequence similarities. Such greedy approaches may be vulnerable to spurious random similarities and can therefore...
  • KJS

  • Referenced in 7 articles [sw18992]
  • trivial programs and found a known security vulnerability...
  • TAJ

  • Referenced in 7 articles [sw33114]
  • operations. Taint analysis can detect many common vulnerabilities in Web applications, and so has attracted...