官僚统治 发表于 2025-3-30 08:30:31
http://reply.papertrans.cn/25/2423/242295/242295_51.png灵敏 发表于 2025-3-30 13:33:06
Predicting Code Vulnerability Types via Heterogeneous GNN Learningdiverse relationships within ICCPGs, thereby enabling the classification of vulnerabilities into specific types. The proposed approach achieved an accuracy of 92.8% in the C language, covering up to 108 different vulnerability types, and the top-2 classification further improved this score to 95.5%.Confidential 发表于 2025-3-30 19:38:37
WASMixer: Binary Obfuscation for WebAssembly(de)cryption method to minimize the performance impact on memory data, and code splitting/reconstructing algorithms to handle Wasm highly-structured control flow. Extensive experiments demonstrate the correctness, effectiveness and efficiency of .. Our research has shed light on the promising directunstable-angina 发表于 2025-3-31 00:36:36
http://reply.papertrans.cn/25/2423/242295/242295_54.png拥挤前 发表于 2025-3-31 02:49:38
TGRop: Top Gun of Return-Oriented Programming Automationt . outperforms all existing approaches by more than 1.62–3.11 times. Additionally, we validate the rationale behind its design via analytical experiments. When running . against the newest ROP mitigations, we discovered their weaknesses and reported to vendors.overreach 发表于 2025-3-31 08:25:47
SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summariesd treat uninitialized variables as taint sources. We also merge the summary information of called functions to facilitate polymorphic analysis. Furthermore, . includes a vulnerability detection algorithm that starts from dangerous functions and uses summary information and propagation rules in a bot赞美者 发表于 2025-3-31 09:31:01
http://reply.papertrans.cn/25/2423/242295/242295_57.png