Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of symbolic execution techniques
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …
of a program hold for any possible usage scenario. For instance, a tool for identifying …
Systematically understanding the cyber attack business: A survey
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …
publicly available reports, this article conducts an extensive and consistent survey of the …
Neural network-based graph embedding for cross-platform binary code similarity detection
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …
binary functions coming from different platforms are similar or not. It has many security …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
{teEther}: Gnawing at ethereum to automatically exploit smart contracts
Cryptocurrencies like Bitcoin not only provide a decentralized currency, but also provide a
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …
Autoattacker: A large language model guided system to implement automatic cyber-attacks
Large language models (LLMs) have demonstrated impressive results on natural language
tasks, and security researchers are beginning to employ them in both offensive and …
tasks, and security researchers are beginning to employ them in both offensive and …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
Scalable graph-based bug search for firmware images
Because of rampant security breaches in IoT devices, searching vulnerabilities in massive
IoT ecosystems is more crucial than ever. Recent studies have demonstrated that control …
IoT ecosystems is more crucial than ever. Recent studies have demonstrated that control …
Modeling and discovering vulnerabilities with code property graphs
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …
code. Consequently, the protection of computer systems critically depends on the rigorous …
Toward verified artificial intelligence
Toward verified artificial intelligence Page 1 46 COMMUNICATIONS OF THE ACM | JULY
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …