Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,261,196 papers from all fields of science
Search
Sign In
Create Free Account
Libtiff
Libtiff is a library for reading and writing Tagged Image File Format (abbreviated TIFF) files. The set also contains command line tools for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Buffer overflow
Comparison of graphics file formats
Concurrent Versions System
Domain hijacking
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Cyber Vulnerability Intelligence for Internet of Things Binary
Shigang Liu
,
Mahdi Dibaei
,
Yonghang Tai
,
Chao Chen
,
Jun Zhang
,
Yang Xiang
IEEE Transactions on Industrial Informatics
2020
Corpus ID: 209062040
Internet of Things (IoT) integrates a variety of software (e.g., autonomous vehicles and military systems) in order to enable the…
Expand
2019
2019
A Lightweight Assisted Vulnerability Discovery Method Using Deep Neural Networks
Runhao Li
,
Chao Feng
,
Xing Zhang
,
Chaojing Tang
IEEE Access
2019
Corpus ID: 195775727
Thousands of vulnerabilities are discovered in programs every day, which is extremely harmful to software security. Thus…
Expand
2019
2019
Locating Vulnerability in Binaries Using Deep Neural Networks
Runhao Li
,
Chen Zhang
,
Chao Feng
,
Xing Zhang
,
Chaojing Tang
IEEE Access
2019
Corpus ID: 203605839
Binary fault localization is important for vulnerability analysis, but many current techniques face problems in locating…
Expand
2019
2019
Program State Sensitive Parallel Fuzzing for Real World Software
Jiaxi Ye
,
Bin Zhang
,
Ruilin Li
,
Chao Feng
,
Chaojing Tang
IEEE Access
2019
Corpus ID: 88484402
Fuzz testing is a widely used technique for software vulnerability detection, but it is still limited in finding bugs nested in…
Expand
2018
2018
Deep Ahead-of-Threat Virtual Patching
Fady Copty
,
Andre Kassis
,
S. Barner
,
Dov Murik
IOSec@RAID
2018
Corpus ID: 59524159
Many applications have security vulnerabilities that can be exploited. It is practically impossible to find all of them due to…
Expand
2014
2014
Creació d'una seqüència de moviment a partir de fotografies
Oriol Ribes Amenós
,
Francisco Javier Sánchez Pujadas
2014
Corpus ID: 194791618
Aquest projecte consisteix en una aplicacio per ordinador, amb la qual a partir d'un conjunt d'imatges fetes amb una camera…
Expand
Review
2008
Review
2008
The Planets Approach to Migration Tools
E. Zierau
,
C. van Wijk
Archiving Conference
2008
Corpus ID: 3889536
This paper discusses the Planets approach to migration tool development. The approach consists of enhancing existing migration…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE