A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
P1OVD: Patch-Based 1-Day Out-of-Bounds Vulnerabilities Detection Tool for Downstream Binaries
2022
Electronics
Compared to the widely used patch-level vulnerability detection tool ReDeBug, P1OVD ignores 4.07 unnecessary lines on average. ...
P1OVD first generates signatures containing patch information and vulnerability root cause information. Then, P1OVD uses an accurate and robust matching algorithm to scan target binaries. ...
By considering both vulnerabilities and patches, MVP [18] outperforms vulnerability detection tools. ...
doi:10.3390/electronics11020260
fatcat:ds5ytk6q45cvrp7mbbg6hnq7vy
TRACER: Finding Patches for Open Source Software Vulnerabilities
[article]
2021
arXiv
pre-print
Our evaluation has also demonstrated the generality and usefulness of TRACER. ...
However, there arises a growing concern about the information quality of vulnerability databases. In particular, it is unclear how the quality of patches in existing vulnerability databases is. ...
Zou et al., “{MVP}: Detecting vulnerabilities using
[46] H. Jo, J. Kim, P. Porras, V. Yegneswaran, and S. ...
arXiv:2112.02240v1
fatcat:cdvmcmzrgjhxjlpmrahle3eoa4
IoT Vertical Applications and Associated Security Requirements
[chapter]
2019
Demystifying Internet of Things Security
SW on the device and the gateway within the vehicle for detecting known and zero-day vulnerabilities. ...
IoT vertical framework: enhance the foundation with
value-added features to enable verticals
416
MVP, other vertical domains begin to leverage that capability as well. ...
doi:10.1007/978-1-4842-2896-8_6
fatcat:eznovqjwwbbn5a4czv3q5cj3cm
DroidBarrier
2014
Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY '14
Many Android vulnerabilities share a root cause of malicious unauthorized applications executing without user's consent. ...
In this paper, we propose the use of a technique called process authentication for Android applications to overcome the shortcomings of current Android security practices. ...
The second alternative approach is to use developer signatures to establish trust. ...
doi:10.1145/2557547.2557571
dblp:conf/codaspy/AlmohriYK14
fatcat:l6ebztk5rrbrpayzb2dixjcjku
Security Considerations for Internet of Things: A Survey
2020
SN Computer Science
vulnerabilities Quick generation of updates and patches to
detected flows, specially in open-source
software
preventing exploitation of well advertised vul-
nerabilities in case of open-source material ...
Kliarsky [82] reviewed the existing threats, vulnerabilities, attacks, and intrusion detection methods that apply to IoT. ...
doi:10.1007/s42979-020-00201-3
fatcat:4gkafccu7vgq7olrqdxdpgm2eu
Towards Efficient Integration of Blockchain for IoT Security: The Case Study of IoT Remote Access
[article]
2019
arXiv
pre-print
Our work presents an example of how blockchain can be used to ensure the fairness of service trading in a decentralized environment and punish misbehaviors objectively. ...
However, because of the lack of reliable firmware update methods, it's hard to push the security patch to vulnerable devices, which undermines the effect of this kind of defense. ...
In our work, TLS-N signatures of malicious packets are used by our reporting system as the evidence of relay servers' misbehaviors.
C. ...
arXiv:1912.00264v1
fatcat:hclxktx5bbhgrmyb5sii22ytze
A survey of intrusion detection in wireless network applications
2014
Computer Communications
Our approach is to classify existing contemporary wireless intrusion detection system (IDS) techniques based on target wireless network, detection technique, collection process, trust model and analysis ...
In order to identify gaps and propose research directions in wireless network intrusion detection research, we survey the literature of this area. ...
While Moyers, et al. did claim one MVP-IDS module [Bluetooth Attack Detection and Signature System (BADSS)] achieved a 100% detection rate with only a 2.97% false positive rate, the authors did not provide ...
doi:10.1016/j.comcom.2014.01.012
fatcat:24cujhgddrfppnbrtqy4u7xvm4
Tryptophan metabolism drives dynamic immunosuppressive myeloid states in IDH-mutant gliomas
2021
Nature Cancer
thus enhanced the AP signature (Fig. 6e). ...
and cells with less than 500 detected genes
regions were specified using flexImaging 5.0x64 (Bruker Daltonics). ...
doi:10.1038/s43018-021-00201-z
pmid:35121943
fatcat:bjxachjarvetzi347w2rvzmdfa
Melanoma-Associated Retinopathy
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3612
fatcat:o4qtgpwxtna5haqsa57taks5j4
Metastasis Suppressor KAI1/CD82
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3674
fatcat:4x4t7s3i4neudht6o3kggvmpdy
Membrane-Lipid Therapy
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3624
fatcat:3ktugba5kzamrhsosneyde6uvy
Microarray (cDNA) Technology
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3710
fatcat:ylai4nekxfdifghljf6kegdjbe
Mitotic Arrest-Deficient Protein 1
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3778
fatcat:tin4mbocj5h2tn5bngkz7zp27a
Major Vault Protein
[chapter]
2011
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
UV irradiation enhanced MVP's tyrosil phosphorylation, caused dissociation of COP1 from MVP, and attenuated the inhibitory activity of MVP on ▶ AP-1 (Activator Protein-1) transcription. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-642-16483-5_3504
fatcat:gitkzcftfvhlbda3ptisojtily
Myeloid Cell Leukemia Sequence 1
[chapter]
2016
Encyclopedia of Cancer
MVP, SHP-2, and MAPKs was detected in MCF-7 cells. ...
Despite the absence of any signature signals for specific compartmentalization, maspin has been detected as a cytoplasmic, a nuclear, and a cell surface-associated protein. ...
With these approaches, the efficacy of conventional ▶ chemotherapy would be enhanced and enable the use of lower drug doses to reduce adverse effects. ...
doi:10.1007/978-3-662-46875-3_101586
fatcat:c4bxxh6sa5fqri4qbxxanqqn2a
« Previous
Showing results 1 — 15 out of 58 results