Login / Signup
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts.
Shuo Yang
Jiachi Chen
Mingyuan Huang
Zibin Zheng
Yuan Huang
Published in:
ICSE (2024)
Keyphrases
</>
attack scenarios
attack graphs
countermeasures
attack graph
sql injection
security flaws
security vulnerabilities
security risks
attack detection
sql injection attacks
security mechanisms
intrusion detection system
buffer overflow
defense mechanisms
network intrusion detection systems
web applications
alert correlation
information security
security issues
detect malicious
denial of service
automatic identification
dos attacks
detecting anomalies
supply chain
multistage
data corruption
watermarking scheme
automatic detection
detecting malicious
security problems
cyber attacks
web services
data mining
neural network