Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Taintmini: Detecting flow of sensitive data in mini-programs with static taint analysis
Mini-programs, which are programs running inside mobile super apps such as WeChat,
often have access to privacy-sensitive information, such as location data and phone …
often have access to privacy-sensitive information, such as location data and phone …
Karonte: Detecting insecure multi-binary interactions in embedded firmware
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …
Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …
MCI: Modeling-based causality inference in audit logging for attack investigation
In this paper, we develop a model based causality inference technique for audit logging that
does not require any application instrumentation or kernel modification. It leverages a recent …
does not require any application instrumentation or kernel modification. It leverages a recent …
Reassembleable disassembling
Reverse engineering has many important applications in computer security, one of which is
retrofitting software for safety and security hardening when source code is not available. By …
retrofitting software for safety and security hardening when source code is not available. By …
{PolyCruise}: A {Cross-Language} dynamic information flow analysis
Despite the fact that most real-world software systems today are written in multiple
programming languages, existing program analysis based security techniques are still …
programming languages, existing program analysis based security techniques are still …
Rain: Refinable attack investigation with on-demand inter-process information flow tracking
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …
their early stages becomes virtually impossible. Instead, an attack investigation or …
DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism
J Wang, H **ao, S Zhong, Y **ao - Future Generation Computer Systems, 2023 - Elsevier
Software vulnerabilities can pose severe harms to a computing system. They can lead to
system crash, privacy leakage, or even physical damage. Correctly identifying vulnerabilities …
system crash, privacy leakage, or even physical damage. Correctly identifying vulnerabilities …
{BootStomp}: On the security of bootloaders in mobile devices
Modern mobile bootloaders play an important role in both the function and the security of the
device. They help ensure the Chain of Trust (CoT), where each stage of the boot process …
device. They help ensure the Chain of Trust (CoT), where each stage of the boot process …
[HTML][HTML] A survey and taxonomy of program analysis for IoT platforms
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting
security and privacy. IoT environment has become an open invitation to hackers to control …
security and privacy. IoT environment has become an open invitation to hackers to control …