Cited By
View all- Zhang ZHao YChen WZou XLi XLi HZhai YQian ZLau BBalzarotti DXu W(2024)SymBisectProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699040(2493-2510)Online publication date: 14-Aug-2024
- Huang KLu CCao YChen BPeng XLuo BLiao XXu JKirda ELie D(2024)VMud: Detecting Recurring Vulnerabilities with Multiple Fixing Functions via Function Selection and Semantic Equivalent Statement MatchingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690372(3958-3972)Online publication date: 2-Dec-2024
- Halder SBewong MMahboubi AJiang YIslam MIslam MIp RAhmed MRamachandran GAli Babar MChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Malicious Package Detection using Metadata InformationProceedings of the ACM Web Conference 202410.1145/3589334.3645543(1779-1789)Online publication date: 13-May-2024
- Show More Cited By