官僚统治 发表于 2025-3-30 08:30:31

http://reply.papertrans.cn/25/2423/242295/242295_51.png

灵敏 发表于 2025-3-30 13:33:06

Predicting Code Vulnerability Types via Heterogeneous GNN Learningdiverse relationships within ICCPGs, thereby enabling the classification of vulnerabilities into specific types. The proposed approach achieved an accuracy of 92.8% in the C language, covering up to 108 different vulnerability types, and the top-2 classification further improved this score to 95.5%.

Confidential 发表于 2025-3-30 19:38:37

WASMixer: Binary Obfuscation for WebAssembly(de)cryption method to minimize the performance impact on memory data, and code splitting/reconstructing algorithms to handle Wasm highly-structured control flow. Extensive experiments demonstrate the correctness, effectiveness and efficiency of .. Our research has shed light on the promising direct

unstable-angina 发表于 2025-3-31 00:36:36

http://reply.papertrans.cn/25/2423/242295/242295_54.png

拥挤前 发表于 2025-3-31 02:49:38

TGRop: Top Gun of Return-Oriented Programming Automationt . outperforms all existing approaches by more than 1.62–3.11 times. Additionally, we validate the rationale behind its design via analytical experiments. When running . against the newest ROP mitigations, we discovered their weaknesses and reported to vendors.

overreach 发表于 2025-3-31 08:25:47

SerdeSniffer: Enhancing Java Deserialization Vulnerability Detection with Function Summariesd treat uninitialized variables as taint sources. We also merge the summary information of called functions to facilitate polymorphic analysis. Furthermore, . includes a vulnerability detection algorithm that starts from dangerous functions and uses summary information and propagation rules in a bot

赞美者 发表于 2025-3-31 09:31:01

http://reply.papertrans.cn/25/2423/242295/242295_57.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Computer Security – ESORICS 2024; 29th European Sympos Joaquin Garcia-Alfaro,Rafał Kozik,Sokratis Katsika Conference proceedings 2024 The E