Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Auto forensic detecting algorithms of malicious code fragment based on TensorFlow
Binglong LI, Jinlong TONG, Yu ZHANG, Yifeng SUN, Qingxian WANG, Chaowen CHANG
Published in 网络与信息安全学报 (01.08.2021)
Get full text
Published in 网络与信息安全学报 (01.08.2021)
Journal Article
Detection of malicious code fragments via data-flow isolation
Year of Publication 25.05.2021
Get full text
Patent
Intelligent malicious code fragment evidence obtaining method and system
WANG QINGXIAN, TONG JINLONG, CHANG CHAOWEN, ZHANG YU, SUN YIFENG, LI BINGLONG, LI YUANFANG
Year of Publication 03.11.2020
Get full text
Year of Publication 03.11.2020
Patent
IBM (IBM) issued patent titled "Detection of malicious code fragments via data-flow isolation"
Published in News Bites - Computing & Information
(27.05.2021)
Get full text
Newsletter
DETECTION OF MALICIOUS CODE FRAGMENTS VIA DATA-FLOW ISOLATION
Year of Publication 21.11.2017
Get full text
Patent
DBESN: A novel model for detecting and identifying malicious code in a smart contract
Bedi, Punam, Jindal, Vinita, Ningshen, Ningyao, Gole, Pushkar
Published in Blockchain. Research and applications Online (01.05.2025)
Published in Blockchain. Research and applications Online (01.05.2025)
Get full text
Journal Article
Cyber Security for a Hyper-connected World - Threats are no longer restricted to fragments of malicious code, aimed to exasperate, incite or stall but are strategic, targeted, organized and can cause deep-seated damage to an organization's reputation
Published in Dataquest
(27.01.2015)
Get full text
Trade Publication Article
Malicious code detection method based on API fragments
BAI WEI, JIANG KAOLIN, GUO SHIZE, ZHANG YANYAN, MA XIN, CHEN JUN, PAN ZHISONG
Year of Publication 21.02.2020
Get full text
Year of Publication 21.02.2020
Patent
On Locating Malicious Code in Piggybacked Android Apps
Li, Li, Li, Daoyuan, Bissyandé, Tegawendé F., Klein, Jacques, Cai, Haipeng, Lo, David, Le Traon, Yves
Published in Journal of computer science and technology (01.11.2017)
Published in Journal of computer science and technology (01.11.2017)
Get full text
Journal Article
JiuJITsu: Removing Gadgets with Safe Register Allocation for JIT Code Generation
Published in ACM transactions on architecture and code optimization
(15.12.2023)
Get full text
Journal Article
PtrProxy: Efficient code re-randomization on AArch64 platform
Chenke, Luo, Jianming, Fu, Jiang, Ming, Mengfei, Xie, Guojun, Peng
Published in China communications (01.06.2025)
Published in China communications (01.06.2025)
Get full text
Journal Article
Catch Me if You Can! Transparent Detection of Shellcode
Buhov, Damjan, Thron, Richard, Schrittwieser, Sebastian
Published in 2016 International Conference on Software Security and Assurance (ICSSA) (01.08.2016)
Published in 2016 International Conference on Software Security and Assurance (ICSSA) (01.08.2016)
Get full text
Conference Proceeding