A literature study of embeddings on source code
Z Chen, M Monperrus - arXiv preprint arXiv:1904.03061, 2019 - arxiv.org
Natural language processing has improved tremendously after the success of word
embedding techniques such as word2vec. Recently, the same idea has been applied on …
embedding techniques such as word2vec. Recently, the same idea has been applied on …
Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …
security. It is especially important to localize the vulnerable functions among the source code …
Graph matching networks for learning the similarity of graph structured objects
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …
objects, and makes two key contributions. First, we demonstrate how Graph Neural …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation
Cyber attacks against IoT devices are a severe threat. These attacks exploit software
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …
Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise
F Liu, Y Wen, D Zhang, X Jiang, X Xing… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …
organizational information system. Existing detections mainly concentrate on users' behavior …
{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel
Machine learning has become mainstream across industries. Numerous examples prove the
validity of it for security applications. In this work, we investigate how to reverse engineer a …
validity of it for security applications. In this work, we investigate how to reverse engineer a …
Superion: Grammar-aware greybox fuzzing
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …
Safe: Self-attentive function embeddings for binary similarity
The binary similarity problem consists in determining if two functions are similar by only
considering their compiled form. Techniques for binary similarity have an immediate …
considering their compiled form. Techniques for binary similarity have an immediate …
NL2Type: Inferring JavaScript function types from natural language information
JavaScript is dynamically typed and hence lacks the type safety of statically typed
languages, leading to suboptimal IDE support, difficult to understand APIs, and unexpected …
languages, leading to suboptimal IDE support, difficult to understand APIs, and unexpected …