Search
📋
발표/논문 정리
보안 관련 발표 및 논문을 정리하는 페이지입니다.
본 페이지는 논문 발행일 기준으로 정리되어있으며, search를 통해 통합검색할 수 있습니다.
search는 tag, created, 그리고 conference 필드를 인식합니다.
archive
에서도 확인할 수 있습니다.
Gallery view
Search
The Circle Of Life: A Large-Scale Study of The IoT Malware Lifecycle
Usenix
IoT
Malware
2021
Can I Take Your Subdomain? Exploring Same-Site Attacks in the Modern Web
Usenix
Web
Subdomain
2021
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing
Usenix
Fuzzing
ZAFL
2021
Is Your Firmware Real or Re-Hosted?
NDSS
Firmware
Re-hosting
VxWorks
2021
FANS: Fuzzing Android Native System Services via Automated Interface Analysis
Usenix
Android
Fuzzing
2020
Empirical Analysis of MAVLink Protocol Vulnerability for Attacking Unmanned Aerial Vehicles
IEEE
IoT
Drone
2018
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms
CCS
64-bit
Memory Bugs
2016
A metric for software readability
ISSTA
metric
readability
2008