Graph neural networks in node classification: survey and evaluation
Neural networks have been proved efficient in improving many machine learning tasks such
as convolutional neural networks and recurrent neural networks for computer vision and …
as convolutional neural networks and recurrent neural networks for computer vision and …
The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
Dos and don'ts of machine learning in computer security
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …
massive datasets, machine learning algorithms have led to major breakthroughs in many …
Combining graph neural networks with expert knowledge for smart contract vulnerability detection
Smart contract vulnerability detection draws extensive attention in recent years due to the
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …
substantial losses caused by hacker attacks. Existing efforts for contract security analysis …
Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …
security. It is especially important to localize the vulnerable functions among the source code …
Combining graph-based learning with automated data collection for code vulnerability detection
This paper presents FUNDED (Flow-sensitive vUl-Nerability coDE Detection), a novel
learning framework for building vulnerability detection models. Funded leverages the …
learning framework for building vulnerability detection models. Funded leverages the …
Graph matching networks for learning the similarity of graph structured objects
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …
objects, and makes two key contributions. First, we demonstrate how Graph Neural …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
GDroid: Android malware detection and classification with graph convolutional network
The dramatic increase in the number of malware poses a serious challenge to the Android
platform and makes it difficult for malware analysis. In this paper, we propose a novel …
platform and makes it difficult for malware analysis. In this paper, we propose a novel …