64 results on '"Tiffany Bao"'
Search Results
2. From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem.
3. "Watching over the shoulder of a professional": Why Hackers Make Mistakes and How They Fix Them.
4. AirTaint: Making Dynamic Taint Analysis Faster and Easier.
5. SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables.
6. Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem.
7. Ahoy SAILR! There is No Need to DREAM of C: A Compiler-Aware Structuring Algorithm for Binary Decompilation.
8. Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation.
9. TYGR: Type Inference on Stripped Binaries using Graph Neural Networks.
10. Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry.
11. Greenhouse: Single-Service Rehosting of Linux-Based Firmware Binaries in User-Space Emulation.
12. Beyond Phish: Toward Detecting Fraudulent e-Commerce Websites at Scale.
13. Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities.
14. RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections.
15. ARVO: Atlas of Reproducible Vulnerabilities for Open Source Software.
16. ViK: practical mitigation of temporal memory safety violations through object ID inspection.
17. Playing for K(H)eaps: Understanding and Improving Linux Kernel Exploit Reliability.
18. Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs.
19. Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
20. 'Flawed, but like democracy we don't have a better system': The Experts' Insights on the Peer Review Process of Evaluating Security Papers.
21. Context-Auditor: Context-sensitive Content Injection Mitigation.
22. I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior.
23. Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore.
24. CrawlPhish: Large-Scale Analysis of Client-Side Cloaking Techniques in Phishing.
25. Exploring the Limits of ChatGPT in Software Security Applications.
26. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask).
27. Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service.
28. CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing.
29. MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts.
30. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning.
31. Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
32. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems.
33. Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.
34. Understanding and Predicting Private Interactions in Underground Forums.
35. Matched and Mismatched SOCs: A Qualitative Study on Security Operations Center Issues.
36. Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
37. Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
38. Expected Exploitability: Predicting the Development of Functional Vulnerability Exploits.
39. Scam Pandemic: How Attackers Exploit Public Fear through Phishing.
40. Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits.
41. How Shall We Play a Game?: A Game-theoretical Model for Cyber-warfare Games.
42. BYTEWEIGHT: Learning to Recognize Functions in Binary Code.
43. Cyber Autonomy in Software Security: Techniques and Tactics
44. SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
45. CrawlPhish: Large-scale Analysis of Client-side Cloaking Techniques in Phishing
46. Scam Pandemic: How Attackers Exploit Public Fear through Phishing
47. Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)
48. MuTent: Dynamic Android Intent Protection with Ownership-Based Key Distribution and Security Contracts
49. Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases
50. HoneyPLC: A Next-Generation Honeypot for Industrial Control Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.