Smart contracts are increasingly being used to manage large numbers of
h...
The number of papers submitted to academic conferences is steadily risin...
We are currently witnessing dramatic advances in the capabilities of Lar...
Recently, large language models for code generation have achieved
breakt...
Fuzzing is a key method to discover vulnerabilities in programs. Despite...
Diffusion models (DMs) have recently emerged as a promising method in im...
Modern websites frequently use and embed third-party services to facilit...
Memory safety in complex applications implemented in unsafe programming
...
Coverage-guided fuzz testing ("fuzzing") has become mainstream and we ha...
Software obfuscation is a crucial technology to protect intellectual
pro...
This work evaluates the reproducibility of the paper "CNN-generated imag...
Adversarial examples seem to be inevitable. These specifically crafted i...
In the past few years, we observed a wide adoption of practical systems ...
Voice assistants like Amazon's Alexa, Google's Assistant, or Apple's Sir...
Polymorphism and inheritance make C++ suitable for writing complex softw...
Memory corruption vulnerabilities are still a severe threat for software...
Memory disclosure attacks play an important role in the exploitation of
...
Microcode is an abstraction layer used by modern x86 processors that
int...
Just-in-time return-oriented programming (JIT-ROP) is a powerful memory
...
The art of finding software vulnerabilities has been covered extensively...
More than two decades after the first stack smashing attacks, memory
cor...
The wide-spread adoption of system defenses such as the randomization of...
Memory corruption vulnerabilities have been around for decades and rank ...
Vulnerabilities in private networks are difficult to detect for attacker...
Deep neural networks can generate images that are astonishingly realisti...
In the modern Web, service providers often rely heavily on third parties...
Microcode is an abstraction layer on top of the physical components of a...
Since the adoption of the General Data Protection Regulation (GDPR) in M...
Automatic speech recognition (ASR) systems are possible to fool via targ...
Automatic speech recognition (ASR) systems are possible to fool via targ...
Software complexity has increased over the years. One common way to tack...
The domain name system (DNS) is a crucial backbone of the Internet and
m...
The European General Data Protection Regulation (GDPR), which went into
...
Voice interfaces are becoming accepted widely as input methods for a div...
The European Union's General Data Protection Regulation (GDPR) went into...
Ransomware, a type of malicious software that encrypts a victim's files ...
Price differentiation describes a marketing strategy to determine the pr...