A literature study of embeddings on source code

Z Chen, M Monperrus - arXiv preprint arXiv:1904.03061, 2019 - arxiv.org
Natural language processing has improved tremendously after the success of word
embedding techniques such as word2vec. Recently, the same idea has been applied on …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

Graph matching networks for learning the similarity of graph structured objects

Y Li, C Gu, T Dullien, O Vinyals… - … conference on machine …, 2019 - proceedings.mlr.press
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation

Y Zheng, A Davanian, H Yin, C Song, H Zhu… - 28th USENIX Security …, 2019 - usenix.org
Cyber attacks against IoT devices are a severe threat. These attacks exploit software
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …

Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise

F Liu, Y Wen, D Zhang, X Jiang, X Xing… - Proceedings of the 2019 …, 2019 - dl.acm.org
Conventional attacks of insider employees and emerging APT are both major threats for the
organizational information system. Existing detections mainly concentrate on users' behavior …

{CSI}{NN}: Reverse engineering of neural network architectures through electromagnetic side channel

L Batina, S Bhasin, D Jap, S Picek - 28th USENIX Security Symposium …, 2019 - usenix.org
Machine learning has become mainstream across industries. Numerous examples prove the
validity of it for security applications. In this work, we investigate how to reverse engineer a …

Superion: Grammar-aware greybox fuzzing

J Wang, B Chen, L Wei, Y Liu - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
In recent years, coverage-based greybox fuzzing has proven itself to be one of the most
effective techniques for finding security bugs in practice. Particularly, American Fuzzy Lop …

Safe: Self-attentive function embeddings for binary similarity

L Massarelli, GA Di Luna, F Petroni, R Baldoni… - Detection of Intrusions …, 2019 - Springer
The binary similarity problem consists in determining if two functions are similar by only
considering their compiled form. Techniques for binary similarity have an immediate …

NL2Type: Inferring JavaScript function types from natural language information

RS Malik, J Patra, M Pradel - 2019 IEEE/ACM 41st International …, 2019 - ieeexplore.ieee.org
JavaScript is dynamically typed and hence lacks the type safety of statically typed
languages, leading to suboptimal IDE support, difficult to understand APIs, and unexpected …