Analysis of DTLS Implementations Using Protocol State Fuzzing --2022-11-13
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing --2022-11-13
Diane: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices --2022-11-13
EcoFuzz: Adaptive Energy-Saving Greybox Fuzzing as a Variant of the Adversarial Multi-Armed Bandit --2022-11-13
FuzzGen: Automatic Fuzzer Generation --2022-11-13
Fuzzification: Anti-Fuzzing Techniques --2022-11-13
Fuzzing Error Handling Code using Context-Sensitive Software Fault Injection --2022-11-13
ICSFuzz: Manipulating I/Os and Repurposing Binary Code to Enable Instrumented Fuzzing in ICS Control Applications阅读笔记 --2022-11-13
Nyx: Greybox Hypervisor Fuzzing using Fast Snapshots and Affine Types --2022-11-13
ParmeSan: Sanitizer-guided Greybox Fuzzing --2022-11-13
(State of) The Art of War: Offensive Techniques in Binary Analysis --2022-11-13
< unknown title article > --2022-11-13
反调试技术合集 --2022-11-13
APC注入技术 --2022-11-13
Binwalk安装踩坑指南 --2022-11-13
Boches虚拟机学习 --2022-11-13
Detours学习 --2022-11-13
三个用于恶意软件动态分析的使用方法 --2022-11-13
天堂之门技术 --2022-11-13
IAT hook --2022-11-13
CruParamer: Learning on Parameter-Augmented API Sequences for Malware Detection --2022-11-13
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes --2022-11-13
ExSpectre: Hiding Malware in Speculative Execution --2022-11-13
Forecasting Malware Capabilities From Cyber Attack Memory Images --2022-11-13
How Machine Learning Is Solving the Binary Function Similarity Problem --2022-11-13
Identifying ATT&CK Tactics in Android Malware Control Flow Graph Through Graph Representation Learning and Interpretability --2022-11-13
Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines --2022-11-13
PatchGuard: A Provably Robust Defense against Adversarial Patches via Small Receptive Fieldsand Masking --2022-11-13
Prevalence and Impact of Low-Entropy Packing Schemes in the Malware Ecosystem --2022-11-13
Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land --2022-11-13
TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time --2022-11-13
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle --2022-11-13
Understanding Malicious Cross-library Data Harvesting on Android --2022-11-13
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features --2022-11-13
“Weird Machines” in ELF: A Spotlight on the Underappreciated Metadata --2022-11-13
YarIx: Scalable YARA-based Malware Intelligence --2022-11-13
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis --2022-11-13
PatchGuard(Kernel Patch Protect)学习 --2022-11-13
Pyd逆向学习 --2022-11-13
远程线程注入 --2022-11-13
SeDebugPrivilege提权 --2022-11-13
Self-Remapping Code学习 --2022-11-13
shim-based DLL injection --2022-11-13
数据流分析 --2022-11-15
时间无关调试学习笔记 --2022-11-16
VBA STOMPING免杀 --2022-11-13
Windows Segment Heap学习 --2022-11-13
Windows驱动开发 --2022-11-13
恶意软件签名 --2022-12-05
Powershell反混淆 --2022-12-05