共 50 条
- [11] Towards Automatic Measure-Wise Feature Extraction Pipeline for Music Performance Analysis 2022 45TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, TSP, 2022, : 192 - 195
- [12] Towards Automated Exploit Generation for Embedded Systems INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 161 - 173
- [13] An Automatic Exploit Generation Method Based on Symbolic Execution 2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 437 - 440
- [14] Automatic validation of pipeline specifications SIXTH IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2001, : 9 - 13
- [15] PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 951 - 957
- [16] FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 197 - 214
- [18] Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 824 - 839
- [19] Automatic analysis of loops to exploit operator parallelism on reconfigurable systems LANGUAGES AND COMPILERS FOR PARALLEL COMPUTING, 1999, 1656 : 305 - 322