Graph neural networks in node classification: survey and evaluation

S Xiao, S Wang, Y Dai, W Guo - Machine Vision and Applications, 2022 - Springer
Neural networks have been proved efficient in improving many machine learning tasks such
as convolutional neural networks and recurrent neural networks for computer vision and …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

A taxonomy of IoT firmware security and principal firmware analysis techniques

I Nadir, H Mahmood, G Asadullah - International Journal of Critical …, 2022 - Elsevier
Abstract Internet of Things (IoT) has come a long way since its inception. However, the
standardization process in IoT systems for a secure IoT solution is still in its early days …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

Practical binary code similarity detection with bert-based transferable similarity learning

S Ahn, S Ahn, H Koo, Y Paek - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …

Efficient greybox fuzzing of applications in Linux-based IoT devices via enhanced user-mode emulation

Y Zheng, Y Li, C Zhang, H Zhu, Y Liu… - Proceedings of the 31st …, 2022 - dl.acm.org
Greybox fuzzing has become one of the most effective vulnerability discovery techniques.
However, greybox fuzzing techniques cannot be directly applied to applications in IoT …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Deepag: Attack graph construction and threats prediction with bi-directional deep learning

T Li, Y Jiang, C Lin, MS Obaidat… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The complicated multi-step attacks, such as Advanced Persistent Threats (APTs), have
brought considerable threats to cybersecurity because they are naturally varied and …