-
2
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
A. Bradley. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognition, 30(7):1145-1159, 1997..
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.1
-
4
-
-
38549173275
-
Static detection of vulnerabilities in x86 executables
-
M. Cova, V. Felmetsger, G. Banks, and G. Vigna. Static detection of vulnerabilities in x86 executables. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 269-278, 2006..
-
(2006)
Proc. of Annual Computer Security Applications Conference (ACSAC)
, pp. 269-278
-
-
Cova, M.1
Felmetsger, V.2
Banks, G.3
Vigna, G.4
-
6
-
-
0036041420
-
Bugs as deviant behavior: A general approach to inferring errors in systems code
-
D. Engler, D. Y. Chen, S. Hallem, A. Chou, and B. Chelf. Bugs as deviant behavior: A general approach to inferring errors in systems code. In Proc. of ACM Symposium on Operating Systems Principles (SOSP), pages 57-72, 2001..
-
(2001)
Proc. of ACM Symposium on Operating Systems Principles (SOSP)
, pp. 57-72
-
-
Engler, D.1
Chen, D.Y.2
Hallem, S.3
Chou, A.4
Chelf, B.5
-
7
-
-
0036147522
-
Improving security using extensible lightweight static analysis
-
D. Evans and D. Larochelle. Improving security using extensible lightweight static analysis. IEEE Software, 19(1):42-51, 2002..
-
(2002)
IEEE Software
, vol.19
, Issue.1
, pp. 42-51
-
-
Evans, D.1
Larochelle, D.2
-
9
-
-
84857600799
-
SAGE: Whitebox fuzzing for security testing
-
P. Godefroid, M. Y. Levin, and D. Molnar. SAGE: whitebox fuzzing for security testing. Communications of the ACM, 55(3):40-44, 2012..
-
(2012)
Communications of the ACM
, vol.55
, Issue.3
, pp. 40-44
-
-
Godefroid, P.1
Levin, M.Y.2
Molnar, D.3
-
10
-
-
77955903017
-
Learning from 6,000 projects: Lightweight cross-project anomaly detection
-
N. Gruska, A. Wasylkowski, and A. Zeller. Learning from 6,000 projects: lightweight cross-project anomaly detection. In Proc. of the International Symposium on Software Testing and Analysis (ISSTA), pages 119-130, 2010..
-
(2010)
Proc. of the International Symposium on Software Testing and Analysis (ISSTA)
, pp. 119-130
-
-
Gruska, N.1
Wasylkowski, A.2
Zeller, A.3
-
11
-
-
79957624835
-
Vulnerability detection systems: Think cyborg, not robot
-
S. Heelan. Vulnerability detection systems: Think cyborg, not robot. IEEE Security & Privacy, 9(3):74-77, 2011..
-
(2011)
IEEE Security & Privacy
, vol.9
, Issue.3
, pp. 74-77
-
-
Heelan, S.1
-
12
-
-
0003620778
-
-
Addison-Wesley, 2 edition
-
J. Hopcroft and J. Motwani, R. Ullmann. Introduction to Automata Theory, Languages, and Computation. Addison-Wesley, 2 edition, 2001..
-
(2001)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, J.2
Ullmann, R.3
-
15
-
-
3042669120
-
Righting software
-
J. R. Larus, T. Ball, M. Das, R. DeLine, M. Fähndrich, J. Pincus, S. K. Rajamani, and R. Venkatapathy. Righting software. IEEE Software, 21(3):92-100, 2004..
-
(2004)
IEEE Software
, vol.21
, Issue.3
, pp. 92-100
-
-
Larus, J.R.1
Ball, T.2
Das, M.3
DeLine, R.4
Fähndrich, M.5
Pincus, J.6
Rajamani, S.K.7
Venkatapathy, R.8
-
16
-
-
32344452883
-
PR-Miner: Automatically extracting implicit programming rules and detecting violations in large software code
-
Z. Li and Y. Zhou. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In Proc. of European Software Engineering Conference (ESEC), pages 306-315, 2005..
-
(2005)
Proc. of European Software Engineering Conference (ESEC)
, pp. 306-315
-
-
Li, Z.1
Zhou, Y.2
-
21
-
-
84889045587
-
Security flaws in universal plug and play: Unplug. Don't play
-
Technical report
-
H. Moore. Security flaws in universal plug and play: Unplug. don't play. Technical report, Rapid 7, 2013..
-
(2013)
Rapid
, vol.7
-
-
Moore, H.1
-
24
-
-
84888991287
-
Recent Java exploitation trends and malware
-
Presentation at
-
J. W. Oh. Recent Java exploitation trends and malware. Presentation at Black Hat Las Vegas, 2012..
-
Black Hat Las Vegas, 2012
-
-
Oh, J.W.1
-
25
-
-
0029345191
-
ANTLR: A predicated-LL(k) parser generator
-
T. Parr and R. Quong. ANTLR: A predicated-LL(k) parser generator. Software Practice and Experience, 25:789-810, 1995..
-
(1995)
Software Practice and Experience
, vol.25
, pp. 789-810
-
-
Parr, T.1
Quong, R.2
-
26
-
-
34748920692
-
Argos: An emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation
-
Apr.
-
G. Portokalidis, A. Slowinska, and H. Bos. Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation. ACM SIGOPS Operating Systems Review, 40(4):15-27, Apr. 2006..
-
(2006)
ACM SIGOPS Operating Systems Review
, vol.40
, Issue.4
, pp. 15-27
-
-
Portokalidis, G.1
Slowinska, A.2
Bos, H.3
-
27
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
Jan.
-
K. Rieck and P. Laskov. Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research (JMLR), 9(Jan):23-48, Jan. 2008..
-
(2008)
Journal of Machine Learning Research (JMLR)
, vol.9
, Issue.JAN
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
29
-
-
77955182005
-
All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask)
-
E. Schwartz, T. Avgerinos, and D. Brumley. All you ever wanted to know about dynamic taint analysis and forward symbolic execution (but might have been afraid to ask). In Proc. of IEEE Symposium on Security and Privacy, pages 317-331, 2010..
-
(2010)
Proc. of IEEE Symposium on Security and Privacy
, pp. 317-331
-
-
Schwartz, E.1
Avgerinos, T.2
Brumley, D.3
-
30
-
-
85084164620
-
Detecting format string vulnerabilities with type qualifiers
-
U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In Proc. of USENIX Security Symposium, pages 201-218, 2001..
-
(2001)
Proc. of USENIX Security Symposium
, pp. 201-218
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
34
-
-
84894034704
-
Autoises: Automatically inferring security specifications and detecting violations
-
L. Tan, X. Zhang, X. Ma, W. Xiong, and Y. Zhou. Autoises: automatically inferring security specifications and detecting violations. In Proc. of USENIX Security Symposium, 2008..
-
Proc. of USENIX Security Symposium, 2008
-
-
Tan, L.1
Zhang, X.2
Ma, X.3
Xiong, W.4
Zhou, Y.5
-
36
-
-
84949505015
-
ITS4: A static vulnerability scanner for C and C++ code
-
J. Viega, J. Bloch, Y. Kohno, and G. McGraw. ITS4: A static vulnerability scanner for C and C++ code. In Proc. of Annual Computer Security Applications Conference (ACSAC), pages 257-267, 2000..
-
(2000)
Proc. of Annual Computer Security Applications Conference (ACSAC)
, pp. 257-267
-
-
Viega, J.1
Bloch, J.2
Kohno, Y.3
McGraw, G.4
-
39
-
-
84872107422
-
-
visited February, 2013
-
D. A. Wheeler. Flawfinder. http://www.dwheeler.com/flawfinder/, visited February, 2013..
-
Flawfinder
-
-
Wheeler, D.A.1
-
40
-
-
24344496977
-
Automatic mining of source code repositories to improve bug finding techniques
-
C. C. Williams and J. K. Hollingsworth. Automatic mining of source code repositories to improve bug finding techniques. IEEE Transactions on Software Engineering, 31:466-480, 2005..
-
(2005)
IEEE Transactions on Software Engineering
, vol.31
, pp. 466-480
-
-
Williams, C.C.1
Hollingsworth, J.K.2
-
43
-
-
69949134981
-
Mapo: Mining and recommending API usage patterns
-
H. Zhong, T. Xie, L. Zhang, J. Pei, and H. Mei. Mapo: Mining and recommending API usage patterns. In Proc. of the European Conference on Object-Oriented Programming(ECOOP), pages 318-343, 2009..
-
(2009)
Proc. of the European Conference on Object-Oriented Programming(ECOOP)
, pp. 318-343
-
-
Zhong, H.1
Xie, T.2
Zhang, L.3
Pei, J.4
Mei, H.5
|