ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval

[1]  Ke Liang,et al.  MKA: A Scalable Medical Knowledge-Assisted Mechanism for Generative Models on Medical Conversation Tasks , 2021, Computational and mathematical methods in medicine.

[2]  David Lie,et al.  In-Fat Pointer: Hardware-Assisted Tagged-Pointer Spatial Memory Safety Defense with Subobject Bound Granularity Protection , 2020 .

[3]  Jiajun Chen,et al.  Topology-Aware Correlations Between Relations for Inductive Link Prediction in Knowledge Graphs , 2021, AAAI.

[4]  Haifeng Hu,et al.  Communicative Message Passing for Inductive Relation Reasoning , 2020, AAAI.

[5]  Bhaskar Biswas,et al.  Link prediction techniques, applications, and performance: A survey , 2020 .

[6]  Trent Jaeger,et al.  Lightweight kernel isolation with virtualization and VM functions , 2020, VEE.

[7]  William L. Hamilton,et al.  Inductive Relation Prediction by Subgraph Reasoning , 2019, ICML.

[8]  Hong Hu,et al.  Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis , 2019, CCS.

[9]  Stephen McCamant,et al.  Program-mandering: Quantitative Privilege Separation , 2019, CCS.

[10]  Yajin Zhou,et al.  Adaptive Call-Site Sensitive Control Flow Integrity , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[11]  Jure Leskovec,et al.  How Powerful are Graph Neural Networks? , 2018, ICLR.

[12]  Torsten Hoefler,et al.  Neural Code Comprehension: A Learnable Representation of Code Semantics , 2018, NeurIPS.

[13]  Taddeus Kroes,et al.  Delta pointers: buffer overflow checks without the checks , 2018, EuroSys.

[14]  Gang Tan,et al.  From Debugging-Information Based Binary-Level Type Inference to CFG Generation , 2018, CODASPY.

[15]  Marc Niethammer,et al.  Stochastic block models with multiple continuous attributes , 2018, Applied Network Science.

[16]  Pietro Liò,et al.  Graph Attention Networks , 2017, ICLR.

[17]  Trent Jaeger,et al.  PtrSplit: Supporting General Pointers in Automatic Program Partitioning , 2017, CCS.

[18]  Jorge A. Navas,et al.  A Context-Sensitive Memory Model for Verification of C/C++ Programs , 2017, SAS.

[19]  Guandong Xu,et al.  Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 , 2017, ASONAM.

[20]  David M. Eyers,et al.  Glamdring: Automatic Application Partitioning for Intel SGX , 2017, USENIX Annual Technical Conference.

[21]  Toni Vallès-Català,et al.  Consistencies and inconsistencies between model selection and link prediction in networks. , 2017, Physical review. E.

[22]  Daniel R. Figueiredo,et al.  struc2vec: Learning Node Representations from Structural Identity , 2017, KDD.

[23]  Samuel S. Schoenholz,et al.  Neural Message Passing for Quantum Chemistry , 2017, ICML.

[24]  Max Welling,et al.  Modeling Relational Data with Graph Convolutional Networks , 2017, ESWC.

[25]  William K. Robertson,et al.  Trellis: Privilege Separation for Multi-user Applications Made Easy , 2016, RAID.

[26]  Jure Leskovec,et al.  node2vec: Scalable Feature Learning for Networks , 2016, KDD.

[27]  Xi Chen,et al.  A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[28]  Tulika Mitra,et al.  Automated Partitioning of Android Applications for Trusted Execution Environments , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[29]  Steven Skiena,et al.  Don't Walk, Skip!: Online Learning of Multi-scale Network Embeddings , 2016, ASONAM.

[30]  Trent Jaeger,et al.  Fine-Grained Control-Flow Integrity for Kernel Software , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[31]  Jingling Xue,et al.  SVF: interprocedural static value-flow analysis in LLVM , 2016, CC.

[32]  Anton Burtsev,et al.  Lightweight capability domains: towards decomposing the Linux kernel , 2015, OPSR.

[33]  Fan Long,et al.  Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.

[34]  Ben Niu,et al.  Per-Input Control-Flow Integrity , 2015, CCS.

[35]  Herbert Bos,et al.  Practical Context-Sensitive CFI , 2015, CCS.

[36]  Yutao Liu,et al.  Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation , 2015, CCS.

[37]  Yannis Smaragdakis,et al.  Pointer Analysis , 2015, Found. Trends Program. Lang..

[38]  Zhendong Su,et al.  Efficient subcubic alias analysis for C , 2014, OOPSLA 2014.

[39]  Úlfar Erlingsson,et al.  Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.

[40]  Ben Niu,et al.  Modular control-flow integrity , 2014, PLDI.

[41]  Steven Skiena,et al.  DeepWalk: online learning of social representations , 2014, KDD.

[42]  Jure Leskovec,et al.  Community Detection in Networks with Node Attributes , 2013, 2013 IEEE 13th International Conference on Data Mining.

[43]  Jun Sun,et al.  Automatically partition software into least privilege components using dynamic data dependency analysis , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).

[44]  Zhenkai Liang,et al.  A Quantitative Evaluation of Privilege Separation in Web Browser Designs , 2013, ESORICS.

[45]  Mingwei Zhang,et al.  Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.

[46]  Yu-Yang Huang,et al.  Unsupervised link prediction using aggregative statistics on heterogeneous social networks , 2013, KDD.

[47]  Chao Zhang,et al.  Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.

[48]  Ben Niu,et al.  Enforcing user-space privilege separation with declarative architectures , 2012, STC '12.

[49]  Derek Bruening,et al.  AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.

[50]  David A. Wagner,et al.  Fine-grained privilege separation for web applications , 2010, WWW '10.

[51]  Roger Guimerà,et al.  Missing and spurious interactions and the reconstruction of complex networks , 2009, Proceedings of the National Academy of Sciences.

[52]  Mihai Budiu,et al.  Control-flow integrity principles, implementations, and applications , 2009, TSEC.

[53]  Milo M. K. Martin,et al.  SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.

[54]  Linyuan Lü,et al.  Predicting missing links via local information , 2009, 0901.0553.

[55]  M. Newman,et al.  Hierarchical structure and the prediction of missing links in networks , 2008, Nature.

[56]  Mark Handley,et al.  Wedge: Splitting Applications into Reduced-Privilege Compartments , 2008, NSDI.

[57]  Xin Zheng,et al.  Secure web applications via automatic partitioning , 2007, SOSP.

[58]  Jon M. Kleinberg,et al.  The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..

[59]  Christos Faloutsos,et al.  Fast Random Walk with Restart and Its Applications , 2006, Sixth International Conference on Data Mining (ICDM'06).

[60]  Wei Xu,et al.  An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.

[61]  D. Song,et al.  Privtrans: automatically partitioning programs for privilege separation , 2004 .

[62]  Thomas W. Reps,et al.  Analyzing Memory Accesses in x86 Executables , 2004, CC.

[63]  Niels Provos,et al.  Preventing Privilege Escalation , 2003, USENIX Security Symposium.

[64]  Lada A. Adamic,et al.  Friends and neighbors on the Web , 2003, Soc. Networks.

[65]  Michael Rodeh,et al.  CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.

[66]  Patrick Cousot,et al.  A static analyzer for large safety-critical software , 2003, PLDI '03.

[67]  Andrew C. Myers,et al.  Using replication and partitioning to build secure distributed systems , 2003, 2003 Symposium on Security and Privacy, 2003..

[68]  Andrew C. Myers,et al.  Secure program partitioning , 2002, TOCS.

[69]  Michael Hind,et al.  Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.

[70]  A. Barabasi,et al.  Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.

[71]  K. J. Ottenstein,et al.  The program dependence graph and its use in optimization , 1984, TOPL.

[72]  Leo Katz,et al.  A new status index derived from sociometric analysis , 1953 .

[73]  Yue Liu,et al.  Reasoning over Different Types of Knowledge Graphs: Static, Temporal and Multi-Modal , 2022, ArXiv.

[74]  Gang Tan,et al.  Refining Indirect Call Targets at the Binary Level , 2021, NDSS.

[75]  Jie Yang,et al.  Origin-sensitive Control Flow Integrity , 2019, USENIX Security Symposium.

[76]  William R. Harris,et al.  Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.

[77]  Tapani Raiko,et al.  International Conference on Learning Representations (ICLR) , 2016 .

[78]  Lars Ole Andersen,et al.  Program Analysis and Specialization for the C Programming Language , 2005 .

[79]  N. Nethercote Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .

[80]  D. Kilpatrick Privman: A Library for Partitioning Applications. , 2003 .

[81]  P. Jaccard Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines , 1901 .