USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware

USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed MalwareПодробнее

USENIX Security '21 - Obfuscation-Resilient Executable Payload Extraction From Packed Malware

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory ImagesПодробнее

USENIX Security '21 - Forecasting Malware Capabilities From Cyber Attack Memory Images

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural NetworksПодробнее

USENIX Security '20 - High Accuracy and High Fidelity Extraction of Neural Networks

USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary ReconstructionПодробнее

USENIX Security '21 - DeepReflect: Discovering Malicious Functionality through Binary Reconstruction

USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation SystemsПодробнее

USENIX Security '20 - PKU Pitfalls: Attacks on PKU-based Memory Isolation Systems

USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program BehaviorПодробнее

USENIX Security '21 - When Malware Changed Its Mind: An Empirical Study of Variable Program Behavior

USENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNSПодробнее

USENIX Security '21 - Injection Attacks Reloaded: Tunnelling Malicious Payloads over DNS

Bypass windows defender with exeПодробнее

Bypass windows defender with exe

USENIX Security '17 - Predicting the Resilience of Obfuscated Code...Подробнее

USENIX Security '17 - Predicting the Resilience of Obfuscated Code...

USENIX Security '24 - Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron...Подробнее

USENIX Security '24 - Rise of Inspectron: Automated Black-box Auditing of Cross-platform Electron...

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware ClassifiersПодробнее

USENIX Security '21 - Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...Подробнее

USENIX Security '23 - Black-box Adversarial Example Attack towards FCG Based Android Malware...

🐍 UNDETECTABLE PYTHON VIRUS ❓😱 #shorts #Python #Security #malware #programmingПодробнее

🐍 UNDETECTABLE PYTHON VIRUS ❓😱 #shorts #Python #Security #malware #programming

USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward AllocationПодробнее

USENIX Security '21 - Preventing Use-After-Free Attacks with Fast Forward Allocation

Malware Analysis - DOSfuscation DeobfuscationПодробнее

Malware Analysis - DOSfuscation Deobfuscation

400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optimaПодробнее

400 Data Obfuscation How to hide data and payloads to make them not exist in a mathematically optima

USENIX Security '20 - FIRMSCOPE: Automatic Uncovering of Privilege-Escalation VulnerabilitiesПодробнее

USENIX Security '20 - FIRMSCOPE: Automatic Uncovering of Privilege-Escalation Vulnerabilities

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code CompletionПодробнее

USENIX Security '21 - You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion

USENIX Security '18 - Tackling runtime-based obfuscation in Android with TIROПодробнее

USENIX Security '18 - Tackling runtime-based obfuscation in Android with TIRO

Популярное