Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @heng_yin
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @heng_yin
-
I am fortunate to have one paper appearing in the top 100 most influential security papers.pic.twitter.com/o9HrPny8gB
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
My PhD student Yue Duan is on the market. I have been lazy about writing the reference letter for him. He already got an onsite interview without my letter. So it means my letter doesn't matter! Best wishes for his job hunting!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I'm glad to be selected as one of the recipients of Google 2019 Security and Privacy Research Award. $100,000 unrestricted monetary gift is offered in recognition of my work on malware analysis and cloud security. Thanks, Google!
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
So excited to receive the best paper award of
#RAID2019 for our fuzzing work! It provides insights for coverage metrics in greybox fuzzing. https://www.cs.ucr.edu/~heng/pubs/afl-sensitive.pdf …pic.twitter.com/fbBQlGX9qt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Ali did a good job presenting our firm-afl work at USENIX Security.
pic.twitter.com/TVPM35TFTD
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Heng Yin proslijedio/la je Tweet
We just released an awesome code search tool Dr. Binary to help security researchers find threats (vulnerabilities, malware, code plagiarism) in software supply chain. Dr. Binary can find statically linked vulnerabilities that are difficult to find before. It is in beta testing
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DECAF v1.9 has been released on GitHub (https://bit.ly/2Yfu55N ). It includes an optimization for tainting called "elastic tainting". Check out https://bit.ly/2ZmCktk for technical details. Documentation has also been greatly improved.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
In last year's CCS, we published a paper called DeepMem, a deep neural network based memory forensic tool. The paper can be found at https://bit.ly/2LJ5I92 . We just made its source code available at https://bit.ly/2XBGssy . Check it out!pic.twitter.com/nZX2O9xoJk
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Three papers got in RAID'19.
Congrats to all my students! One paper is about improving taint analysis performance in DECAF, one paper is about automatic patch generation for Android apps, and the third one is about greybox fuzzing.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Our Firmware fuzzing work has been accepted by USENIX Security 2019. We improved fuzzing throughput on IoT firmware by 10X! Here is the preprint: https://bit.ly/2Hx4P0A
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
DeepBits Deep Thoughts: A Comparative Review of Embedding based Binary Cod... http://blog.deepbitstech.com/2019/05/a-comparative-review-of-embedding-based.html?spref=tw …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.