Limited automated controls integrated into the Python Package Index (PyPI) package uploading process make PyPI an attractive target for attackers to trick developers into using …
L Wang, H Wang, R He, R Tao, G Meng… - Proceedings of the ACM …, 2022 - dl.acm.org
Mobile malware detection has attracted massive research effort in our community. A reliable and up-to-date malware dataset is critical to evaluate the effectiveness of malware detection …
The production of counterfeit money has a long history. It refers to the creation of imitation currency that is produced without the legal sanction of government. With the growth of the …
Package confusion incidents-where a developer is misled into importing a package other than the intended one-are one of the most severe issues in supply chain security with …
Software repositories based on a single programming language are common. Examples include npm (JavaScript) and PyPI (Python). They encourage code reuse, making it trivial for …
Z Gu, Z Xu, H Chen, J Lan, C Meng… - Proceedings of the …, 2023 - openaccess.thecvf.com
Recent object detection approaches rely on pretrained vision-language models for image- text alignment. However, they fail to detect the Mobile User Interface (MUI) element since it …
Mobile gambling app, as a new type of online gambling service emerging in the mobile era, has become one of the most popular and lucrative underground businesses in the mobile …
Z Liu, F Li, Z Li, B Luo - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
The wide adoption of deep neural networks (DNNs) in real-world applications raises increasing security concerns. Neural Trojans embedded in pre-trained neural networks are …
With the increasing popularity of containerized applications, container registries have hosted millions of repositories that allow developers to store, manage, and share their software …