ABSLearn: a GNN-based framework for aliasing and buffer-size information retrieval
暂无分享,去创建一个
[1] Ke Liang,et al. MKA: A Scalable Medical Knowledge-Assisted Mechanism for Generative Models on Medical Conversation Tasks , 2021, Computational and mathematical methods in medicine.
[2] David Lie,et al. In-Fat Pointer: Hardware-Assisted Tagged-Pointer Spatial Memory Safety Defense with Subobject Bound Granularity Protection , 2020 .
[3] Jiajun Chen,et al. Topology-Aware Correlations Between Relations for Inductive Link Prediction in Knowledge Graphs , 2021, AAAI.
[4] Haifeng Hu,et al. Communicative Message Passing for Inductive Relation Reasoning , 2020, AAAI.
[5] Bhaskar Biswas,et al. Link prediction techniques, applications, and performance: A survey , 2020 .
[6] Trent Jaeger,et al. Lightweight kernel isolation with virtualization and VM functions , 2020, VEE.
[7] William L. Hamilton,et al. Inductive Relation Prediction by Subgraph Reasoning , 2019, ICML.
[8] Hong Hu,et al. Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis , 2019, CCS.
[9] Stephen McCamant,et al. Program-mandering: Quantitative Privilege Separation , 2019, CCS.
[10] Yajin Zhou,et al. Adaptive Call-Site Sensitive Control Flow Integrity , 2019, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).
[11] Jure Leskovec,et al. How Powerful are Graph Neural Networks? , 2018, ICLR.
[12] Torsten Hoefler,et al. Neural Code Comprehension: A Learnable Representation of Code Semantics , 2018, NeurIPS.
[13] Taddeus Kroes,et al. Delta pointers: buffer overflow checks without the checks , 2018, EuroSys.
[14] Gang Tan,et al. From Debugging-Information Based Binary-Level Type Inference to CFG Generation , 2018, CODASPY.
[15] Marc Niethammer,et al. Stochastic block models with multiple continuous attributes , 2018, Applied Network Science.
[16] Pietro Liò,et al. Graph Attention Networks , 2017, ICLR.
[17] Trent Jaeger,et al. PtrSplit: Supporting General Pointers in Automatic Program Partitioning , 2017, CCS.
[18] Jorge A. Navas,et al. A Context-Sensitive Memory Model for Verification of C/C++ Programs , 2017, SAS.
[19] Guandong Xu,et al. Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017 , 2017, ASONAM.
[20] David M. Eyers,et al. Glamdring: Automatic Application Partitioning for Intel SGX , 2017, USENIX Annual Technical Conference.
[21] Toni Vallès-Català,et al. Consistencies and inconsistencies between model selection and link prediction in networks. , 2017, Physical review. E.
[22] Daniel R. Figueiredo,et al. struc2vec: Learning Node Representations from Structural Identity , 2017, KDD.
[23] Samuel S. Schoenholz,et al. Neural Message Passing for Quantum Chemistry , 2017, ICML.
[24] Max Welling,et al. Modeling Relational Data with Graph Convolutional Networks , 2017, ESWC.
[25] William K. Robertson,et al. Trellis: Privilege Separation for Multi-user Applications Made Easy , 2016, RAID.
[26] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[27] Xi Chen,et al. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[28] Tulika Mitra,et al. Automated Partitioning of Android Applications for Trusted Execution Environments , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[29] Steven Skiena,et al. Don't Walk, Skip!: Online Learning of Multi-scale Network Embeddings , 2016, ASONAM.
[30] Trent Jaeger,et al. Fine-Grained Control-Flow Integrity for Kernel Software , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[31] Jingling Xue,et al. SVF: interprocedural static value-flow analysis in LLVM , 2016, CC.
[32] Anton Burtsev,et al. Lightweight capability domains: towards decomposing the Linux kernel , 2015, OPSR.
[33] Fan Long,et al. Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity , 2015, CCS.
[34] Ben Niu,et al. Per-Input Control-Flow Integrity , 2015, CCS.
[35] Herbert Bos,et al. Practical Context-Sensitive CFI , 2015, CCS.
[36] Yutao Liu,et al. Thwarting Memory Disclosure with Efficient Hypervisor-enforced Intra-domain Isolation , 2015, CCS.
[37] Yannis Smaragdakis,et al. Pointer Analysis , 2015, Found. Trends Program. Lang..
[38] Zhendong Su,et al. Efficient subcubic alias analysis for C , 2014, OOPSLA 2014.
[39] Úlfar Erlingsson,et al. Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.
[40] Ben Niu,et al. Modular control-flow integrity , 2014, PLDI.
[41] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[42] Jure Leskovec,et al. Community Detection in Networks with Node Attributes , 2013, 2013 IEEE 13th International Conference on Data Mining.
[43] Jun Sun,et al. Automatically partition software into least privilege components using dynamic data dependency analysis , 2013, 2013 28th IEEE/ACM International Conference on Automated Software Engineering (ASE).
[44] Zhenkai Liang,et al. A Quantitative Evaluation of Privilege Separation in Web Browser Designs , 2013, ESORICS.
[45] Mingwei Zhang,et al. Control Flow Integrity for COTS Binaries , 2013, USENIX Security Symposium.
[46] Yu-Yang Huang,et al. Unsupervised link prediction using aggregative statistics on heterogeneous social networks , 2013, KDD.
[47] Chao Zhang,et al. Practical Control Flow Integrity and Randomization for Binary Executables , 2013, 2013 IEEE Symposium on Security and Privacy.
[48] Ben Niu,et al. Enforcing user-space privilege separation with declarative architectures , 2012, STC '12.
[49] Derek Bruening,et al. AddressSanitizer: A Fast Address Sanity Checker , 2012, USENIX Annual Technical Conference.
[50] David A. Wagner,et al. Fine-grained privilege separation for web applications , 2010, WWW '10.
[51] Roger Guimerà,et al. Missing and spurious interactions and the reconstruction of complex networks , 2009, Proceedings of the National Academy of Sciences.
[52] Mihai Budiu,et al. Control-flow integrity principles, implementations, and applications , 2009, TSEC.
[53] Milo M. K. Martin,et al. SoftBound: highly compatible and complete spatial memory safety for c , 2009, PLDI '09.
[54] Linyuan Lü,et al. Predicting missing links via local information , 2009, 0901.0553.
[55] M. Newman,et al. Hierarchical structure and the prediction of missing links in networks , 2008, Nature.
[56] Mark Handley,et al. Wedge: Splitting Applications into Reduced-Privilege Compartments , 2008, NSDI.
[57] Xin Zheng,et al. Secure web applications via automatic partitioning , 2007, SOSP.
[58] Jon M. Kleinberg,et al. The link-prediction problem for social networks , 2007, J. Assoc. Inf. Sci. Technol..
[59] Christos Faloutsos,et al. Fast Random Walk with Restart and Its Applications , 2006, Sixth International Conference on Data Mining (ICDM'06).
[60] Wei Xu,et al. An efficient and backwards-compatible transformation to ensure memory safety of C programs , 2004, SIGSOFT '04/FSE-12.
[61] D. Song,et al. Privtrans: automatically partitioning programs for privilege separation , 2004 .
[62] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[63] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.
[64] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[65] Michael Rodeh,et al. CSSV: towards a realistic tool for statically detecting all buffer overflows in C , 2003, PLDI '03.
[66] Patrick Cousot,et al. A static analyzer for large safety-critical software , 2003, PLDI '03.
[67] Andrew C. Myers,et al. Using replication and partitioning to build secure distributed systems , 2003, 2003 Symposium on Security and Privacy, 2003..
[68] Andrew C. Myers,et al. Secure program partitioning , 2002, TOCS.
[69] Michael Hind,et al. Pointer analysis: haven't we solved this problem yet? , 2001, PASTE '01.
[70] A. Barabasi,et al. Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.
[71] K. J. Ottenstein,et al. The program dependence graph and its use in optimization , 1984, TOPL.
[72] Leo Katz,et al. A new status index derived from sociometric analysis , 1953 .
[73] Yue Liu,et al. Reasoning over Different Types of Knowledge Graphs: Static, Temporal and Multi-Modal , 2022, ArXiv.
[74] Gang Tan,et al. Refining Indirect Call Targets at the Binary Level , 2021, NDSS.
[75] Jie Yang,et al. Origin-sensitive Control Flow Integrity , 2019, USENIX Security Symposium.
[76] William R. Harris,et al. Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.
[77] Tapani Raiko,et al. International Conference on Learning Representations (ICLR) , 2016 .
[78] Lars Ole Andersen,et al. Program Analysis and Specialization for the C Programming Language , 2005 .
[79] N. Nethercote. Bounds-Checking Entire Programs without Recompiling [ Extended , 2004 .
[80] D. Kilpatrick. Privman: A Library for Partitioning Applications. , 2003 .
[81] P. Jaccard. Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines , 1901 .