Aller au contenu principal
X
Main navigation
Accueil
Grands défis
Articles
Chercheurs
Rechercher
Articles
On the Introduction of Guarded Lists in Bach: Expressiveness, Correctness, and Efficiency Issues
Mode-Level Side-Channel Countermeasures
From exploration to classification: harnessing symbolic execution and graph neural networks in malware analysis
Multipath Extension for QUIC
Practicing Abstraction Skills Through Diagrammatic Reasoning Over CAFÉ 2.0
TARTARE: Automatic Generation of C-Pointer Statements and Feedback
Graphical Loop Invariant Based Programming
Packing-Box: Breaking Detectors and Visualizing Packing
Strengthening software security of Odoo :an integrated approach using Semgrep with rule-based modification and optimization
Experimental Toolkit for Manipulating Executable Packing
Building a mutation tool for binaries: expanding a dynamic binary rewriting tool to obfuscate malwares
Refinement of Systems with an Attacker Focus
Statistical Model Checking meets GDPR
On Exploiting Symbolic Execution to Improve the Analysis of RAT Samples with angr
Encryption Mechanisms for Receipt-free and Perfectly Private Elections
Toward interdisciplinary practice and increased social ROI: a case study on downstream effects of integrating UX in cyber system design
Tool paper - Improving security analysis rule set by relationship identification.
Towards Feature-based ML-enabled Behaviour Location
Basic Block Coverage for Unit Test Generation at the SBST 2022 Tool Competition
JUGE: An infrastructure for benchmarking Java unit test generators
Towards Automated Testing for Simple Programming Exercises
A Configurable Approach to Cyber-Physical Systems Fuzzing
Survey and Guidelines about Learning Cyber Security Risk Assessment
Towards Model-Driven DevSecOps for Cyberattack Prevention, Detection and Recovery
Product Incremental Security Risk Assessment Using DevSecOps Practices
Pagination
Première page
« Premier
Page précédente
‹‹
Page
1
Page courante
2
Page
3
Page suivante
››
Dernière page
Dernier »