1![Securify: Practical Security Analysis of Smart Contracts Petar Tsankov Andrei Dan Dana Drachsler-Cohen Securify: Practical Security Analysis of Smart Contracts Petar Tsankov Andrei Dan Dana Drachsler-Cohen](https://www.pdfsearch.io/img/c1c14670ef03cdd262f01ea5c477efbd.jpg) | Add to Reading ListSource URL: files.sri.inf.ethz.chLanguage: English - Date: 2018-09-05 10:55:59
|
---|
2![Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw Poster: Dynamic Taint Analysis of Concurrent Program Based on Symbolic Execution Yu Hao∗ , Xiaodong Zhang∗ , Zijiang Yang† and Ting Liu∗ ,IEEEauthorrefmark2 ∗ Ministry of Education Key Lab for Intelligent Netw](https://www.pdfsearch.io/img/2947c480543c2baacf63d98f14c77bfc.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-30 18:44:12
|
---|
3![A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman A Security Analysis of Police Computer Systems Benjamin VanderSloot∗ Stuart Wheaton∗ J. Alex Halderman](https://www.pdfsearch.io/img/3d33578d372537266f28b54d96f3aac8.jpg) | Add to Reading ListSource URL: benvds.comLanguage: English - Date: 2018-09-18 11:06:16
|
---|
4![HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer HVLearn: Automated Black-box Analysis of Hostname Verification in SSL/TLS Implementations Suphannee Sivakorn, George Argyros, Kexin Pei, Angelos D. Keromytis, and Suman Jana Department of Computer Science Columbia Univer](https://www.pdfsearch.io/img/c8e5c9205a62748b42451c9e44ce73f4.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-04-03 15:58:27
|
---|
5![Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines Poster: An Analysis of Targeted Password Guessing Using Neural Networks Huan Zhou, Qixu Liu, Fangjiao Zhang Institute of Information Engineering, Chinese Academy of Sciences School of Cyber Security, University of Chines](https://www.pdfsearch.io/img/4d1c6485a5856277d1804eab31357591.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2017-05-13 08:13:56
|
---|
6![Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator Context Generation from Formal Specifications for C Analysis Tools Michele Alberti1? and Julien Signoles2 TrustInSoft, Paris, France CEA LIST, Software Reliability and Security Laborator](https://www.pdfsearch.io/img/11cbbfe4a19e4d959b0f4b73c45ad02f.jpg) | Add to Reading ListSource URL: julien.signoles.free.frLanguage: English - Date: 2017-09-15 19:04:15
|
---|
7![Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1 Static Analysis and Runtime-Assertion Checking: Contribution to Security Counter-Measures Dillon Pariente1 and Julien Signoles2 1](https://www.pdfsearch.io/img/49bbdba1c121355b47c842ac3292995a.jpg) | Add to Reading ListSource URL: julien.signoles.free.frLanguage: English - Date: 2017-08-11 12:57:48
|
---|
8![A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog](https://www.pdfsearch.io/img/89ed8cde9c05a0aedba298c2c30ea6a0.jpg) | Add to Reading ListSource URL: hacken.ioLanguage: English - Date: 2017-10-05 12:06:50
|
---|
9![A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog A Securities Law Framework for Blockchain Tokens To estimate how likely a particular blockchain token is be a security under US federal securities law Refer to: full legal analysis Instructions Step 1: Copy to a new goog](https://www.pdfsearch.io/img/b8e4e55a41d907c70d0ae621c7a09763.jpg) | Add to Reading ListSource URL: hacken.ioLanguage: English - Date: 2017-10-12 11:57:40
|
---|
10![Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006 Improving Web Privacy And Security with a Cost-Benefit Analysis of the Web API by Peter Snyder B.A., Lawrence University, 2006](https://www.pdfsearch.io/img/545acf429a81a29001370aed2f533bf0.jpg) | Add to Reading ListSource URL: www.peteresnyder.comLanguage: English - Date: 2018-06-29 22:01:44
|
---|