Keyphrases
Control Flow
85%
Malware Classification
63%
Malware Variants
53%
Matching Method
42%
Structured Control
42%
Robotic Aerial Vehicle
39%
Microcontroller
33%
Cyber-attacks
31%
Network Authentication
31%
Deep Neural Network
31%
Concurrency Bugs
31%
Many-core Systems
31%
Microcontroller System
31%
Backward Compatible
31%
Gadgets
31%
Malware Detection
31%
Phish
31%
Automatic Controller
31%
UAV
31%
Peripheral Access
31%
Identification System
31%
Many-core
31%
Controller Area Network
31%
Bare Metal
31%
Input Validation
31%
Platform Agnostic
31%
Robotic Vehicle
31%
Electronic Control Unit
31%
Classification System
31%
Universal Serial Bus
31%
Embedded Applications
31%
Cross-layer
31%
Performance Evaluation
31%
String Matching
31%
Performance Improvement
31%
Embedded Systems
23%
Memory Space
23%
Embedded Markets
21%
Parallelization
21%
Total Performance
21%
Performance Bottleneck
21%
Malware
21%
Novel Mechanism
21%
Network Packet
18%
State Machine
18%
Internal State
18%
Firmware
17%
Memory Isolation
15%
Concurrent Access
15%
Memory Access
15%
Computer Science
Vehicle Control
100%
Malware
63%
Embedded System
47%
Space Overhead
42%
Security Application
33%
Microcontroller
33%
Network Authentication
31%
Deep Neural Network
31%
Concurrency
31%
Binary Rewriting
31%
Phishing Attack
31%
Reverse Engineering
31%
Input Validation
31%
Program Execution
31%
Electronic Control Unit
31%
Feature Generation
31%
Fuzzing
31%
System Identification
31%
Embedded Application
31%
Universal Serial Bus
31%
Physical Attack
31%
Evaluation Result
23%
Static Program Analysis
22%
Control Flow
22%
e-Mail
19%
Network Packet
18%
Authentication
18%
Symbolic Execution
16%
Processor Architecture
15%
Performance Evaluation
15%
Storage Overhead
15%
Memory Access
15%
Open Source
15%
Target Platform
15%
Access Control
15%
Input/Output
15%
Approximate Matching
15%
Security Challenge
15%
Binary Instrumentation
15%
Performance Improvement
15%
And-States
15%
Computer System
14%
State Machine
12%
Internal State
12%
Concurrent Access
10%
Physical Platform
10%
Program Analysis
10%
Sophisticated Attack
10%