Lemna: Explaining deep learning based security applications

W Guo, D Mu, J Xu, P Su, G Wang, X Xing - proceedings of the 2018 …, 2018 - dl.acm.org
While deep learning has shown a great potential in various domains, the lack of
transparency has limited its application in security or safety-critical areas. Existing research …

Attention-based graph neural network for semi-supervised learning

KK Thekumparampil, C Wang, S Oh, LJ Li - arXiv preprint arXiv …, 2018 - arxiv.org
Recently popularized graph neural networks achieve the state-of-the-art accuracy on a
number of standard benchmark datasets for graph-based semi-supervised learning …

Neural code comprehension: A learnable representation of code semantics

T Ben-Nun, AS Jakobovits… - Advances in neural …, 2018 - proceedings.neurips.cc
With the recent success of embeddings in natural language processing, research has been
conducted into applying similar methods to code analysis. Most works attempt to process the …

Neural machine translation inspired binary code similarity comparison beyond function pairs

F Zuo, X Li, P Young, L Luo, Q Zeng… - arXiv preprint arXiv …, 2018 - arxiv.org
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …

αdiff: cross-version binary code similarity detection with dnn

B Liu, W Huo, C Zhang, W Li, F Li, A Piao… - Proceedings of the 33rd …, 2018 - dl.acm.org
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …

Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary

J Gao, X Yang, Y Fu, Y Jiang, J Sun - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …

Debin: Predicting debug information in stripped binaries

J He, P Ivanov, P Tsankov, V Raychev… - Proceedings of the 2018 …, 2018 - dl.acm.org
We present a novel approach for predicting debug information in stripped binaries. Using
machine learning, we first train probabilistic models on thousands of non-stripped binaries …

Precise and accurate patch presence test for binaries

H Zhang, Z Qian - 27th USENIX Security Symposium (USENIX Security …, 2018 - usenix.org
Patching is the main resort to battle software vulnerabilities. It is critical to ensure that
patches are propagated to all affected software timely, which, unfortunately, is often not the …

A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis

K Redmond, L Luo, Q Zeng - arXiv preprint arXiv:1812.09652, 2018 - arxiv.org
Given a closed-source program, such as most of proprietary software and viruses, binary
code analysis is indispensable for many tasks, such as code plagiarism detection and …

CSI neural network: Using side-channels to recover your artificial neural network information

L Batina, S Bhasin, D Jap, S Picek - arXiv preprint arXiv:1810.09076, 2018 - arxiv.org
Machine learning has become mainstream across industries. Numerous examples proved
the validity of it for security applications. In this work, we investigate how to reverse engineer …