Graph neural networks in node classification: survey and evaluation
Neural networks have been proved efficient in improving many machine learning tasks such
as convolutional neural networks and recurrent neural networks for computer vision and …
as convolutional neural networks and recurrent neural networks for computer vision and …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
A taxonomy of IoT firmware security and principal firmware analysis techniques
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …
standardization process in IoT systems for a secure IoT solution is still in its early days …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
Practical binary code similarity detection with bert-based transferable similarity learning
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …
applications, including software plagiarism, malware classification, and known vulnerability …
Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …
Learning approximate execution semantics from traces for binary function similarity
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …
usages including vulnerability detection, malware analysis, and forensics–requires …
Deepag: Attack graph construction and threats prediction with bi-directional deep learning
T Li, Y Jiang, C Lin, MS Obaidat… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The complicated multi-step attacks, such as Advanced Persistent Threats (APTs), have
brought considerable threats to cybersecurity because they are naturally varied and …
brought considerable threats to cybersecurity because they are naturally varied and …