Facet browsing currently unavailable
Page 1 of 2399187 results
Sort by: relevance publication year
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Exploring Multiple Execution Paths for Malware Analysis PROCEEDINGS ARTICLE published May 2007 in 2007 IEEE Symposium on Security and Privacy (SP '07) |
Panorama PROCEEDINGS ARTICLE published 28 October 2007 in Proceedings of the 14th ACM conference on Computer and communications security |
FIRE: FInding Rogue nEtworks PROCEEDINGS ARTICLE published December 2009 in 2009 Annual Computer Security Applications Conference |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Using Static Program Analysis to Aid Intrusion Detection BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
Static analysis for detecting taint-style vulnerabilities in web applications JOURNAL ARTICLE published 16 August 2010 in Journal of Computer Security |
AccessMiner PROCEEDINGS ARTICLE published 4 October 2010 in Proceedings of the 17th ACM conference on Computer and communications security |
Precise alias analysis for static detection of web application vulnerabilities PROCEEDINGS ARTICLE published 10 June 2006 in Proceedings of the 2006 workshop on Programming languages and analysis for security |
BareBox PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference Research funded by Army Research Office (W911NF-09-1-0553) | Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559CNS-0905537) |
PoX: Protecting users from malicious Facebook applications JOURNAL ARTICLE published July 2012 in Computer Communications |
Disclosure PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Seventh Framework Programme (257007) | Division of Computer and Network Systems (CNS-1116777) |
On the Effectiveness of Techniques to Detect Phishing Sites BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
The power of procrastination PROCEEDINGS ARTICLE published 17 October 2011 in Proceedings of the 18th ACM conference on Computer and communications security |
PoX: Protecting users from malicious Facebook applications PROCEEDINGS ARTICLE published March 2011 in 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) |
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries PROCEEDINGS ARTICLE published 2010 in 2010 IEEE Symposium on Security and Privacy |
Pixy: a static analysis tool for detecting Web application vulnerabilities PROCEEDINGS ARTICLE published 2006 in 2006 IEEE Symposium on Security and Privacy (S&P'06) |
Neurlux PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253) |