Filters








3 Hits in 5.3 sec

Automated Use-After-Free Detection and Exploit Mitigation: How Far Have We Gone

Binfa Gui, Wei Song, Hailong Xiong, Jeff Huang
<span title="">2021</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dthyqga2onff5nwf4agwqtrhxi" style="color: black;">IEEE Transactions on Software Engineering</a> </i> &nbsp;
on Network and Distributed System Security, NDSS’16, 2016.  ...  pointer sweeping,” NDSS’17, San Diego, California, USA, February 26 - March 1, 2017.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2021.3121994">doi:10.1109/tse.2021.3121994</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/35opzmr2gbg67mnftjkdedm7y4">fatcat:35opzmr2gbg67mnftjkdedm7y4</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220106120138/https://ieeexplore.ieee.org/ielx7/32/4359463/09583875.pdf?tp=&amp;arnumber=9583875&amp;isnumber=4359463&amp;ref=" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/db/55/db558277f86c5b754520ed9f500df8c9e1a94af2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tse.2021.3121994"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="unlock alternate icon" style="background-color: #fb971f;"></i> ieee.com </button> </a>

Approximating Cumulative Pebbling Cost is Unique Games Hard [article]

Jeremiah Blocki, Seunghoon Lee, Samson Zhou
<span title="2019-11-15">2019</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Thus, to analyze the (in)security of a candidate iMHF f_G,H, it is crucial to estimate the value cc(G) but currently, upper and lower bounds for leading iMHF candidates differ by several orders of magnitude  ...  The cumulative pebbling complexity of a directed acyclic graph G is defined as cc(G) = min_P ∑_i |P_i|, where the minimum is taken over all legal (parallel) black pebblings of G and |P_i| denotes the number  ...  Acknowledgements Part of this work was done while Samson Zhou was a postdoctoral fellow at Indiana University.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.08078v3">arXiv:1904.08078v3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/n5evfp3q25gvrn43bx5min3f64">fatcat:n5evfp3q25gvrn43bx5min3f64</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200908235937/https://arxiv.org/pdf/1904.08078v3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e4/78/e478c980dffd00718e4d122cd8eaae09627b029e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1904.08078v3" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Material Vulnerabilities: Data Privacy, Corporate Information Security and Securities Regulation

Andrea Matwyshyn, Andrea Matwyshyn
<span class="release-stage">unpublished</span>
Consequently, this article advocates shifting our regulatory approach to a process-based security paradigm that focuses on improving security of our system as a whole.  ...  This article undertakes a normative and empirical legal inquiry into the manner information security vulnerabilities are being addressed through law and in the marketplace.  ...  BARABASI, AND D. J. WATTS (EDS). THE STRUCTURE AND DYNAMICS OF COMPLEX NETWORKS (2003); D. J. WATTS. SIX DEGREES: THE SCIENCE OF A CONNECTED AGE (2003); D. J. WATTS.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ln6fz73o5vb5zjhbtvs3zkbweu">fatcat:ln6fz73o5vb5zjhbtvs3zkbweu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180430060258/http://law.bepress.com/cgi/viewcontent.cgi?article=2623&amp;context=expresso" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2f/7a/2f7a5f1e15647e7e7b11460f09f35bf4eacc1471.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a>