Computer Science
Attackers
91%
Fuzzing
70%
Embedded Device
58%
Phishing Website
47%
Linux
44%
Static Program Analysis
41%
Obfuscation
35%
Analysis Technique
33%
Computer Hardware
30%
Symbolic Execution
27%
Control Flow
27%
Internet-Of-Things
27%
Android
25%
Industrial Control System
23%
Honeypots
23%
Programmable Logic Controller
23%
Injection Vulnerability
23%
Thumb Instruction Set
23%
Function Call
23%
Security Assessment
23%
Potential Direction
23%
Firmware Image
23%
Decompilers
23%
Automated Tool
21%
Bidirectional Encoder Representations From Transformers
19%
False Negative
18%
Malware
17%
Web Application
17%
Stack Variable
17%
Real Vulnerability
17%
Reverse Engineering
17%
False Positive
15%
Program Analysis
15%
Kernel Exploitation
15%
Exploitation Technique
15%
Binary Rewriting
14%
Information Leak
12%
Authentication
12%
Vulnerability Property
11%
Abstract Interpretation
11%
Cybersecurity
11%
Malicious Actor
11%
Instruction Boundary
11%
Online Retailer
11%
Bitcoin
11%
Granularity
11%
Security Implementation
11%
Key Distribution
11%
Reverse Debugging
11%
Malicious Content
11%
Keyphrases
Vulnerability
100%
Attacker
66%
Firmware
51%
Phishing
50%
Fuzzing
47%
Client-side
35%
Phishing Websites
35%
Linux Kernel
35%
Source Code
28%
JavaScript
28%
Anti-phishing
28%
User Space
26%
Honeypot
23%
Industrial Control Systems
23%
Disassembly Tools
23%
Cloaking Techniques
23%
Scam
23%
Vulnerability Detection
23%
Embedded Devices
23%
Binary Analysis
22%
Programmable Logic Controller
22%
Malware
20%
World Wide Web
20%
Linux
18%
Static Analysis
18%
Fuzzer
17%
Command Injection
16%
Safety Violation
16%
Compiler
16%
Popular
15%
Binary Programming
15%
Injection Vulnerability
15%
JavaScript Engine
14%
Android
14%
Temporal Memory Safety
14%
Semi-automated
14%
Fingerprinting
13%
Automated Tool
13%
Obfuscation
13%
Key Security
13%
Cyber
12%
Symbolic Execution
12%
Embedded Firmware
11%
Spotify
11%
Hulu
11%
War Art
11%
Rehosting
11%
Selective Symbolic Execution
11%
Content Injection
11%
Abstract Interpretation
11%