BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention
Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …
software supply chain security. However, existing vulnerability detection methods based on …
[PDF][PDF] len or index or count, anything but v1”: Predicting variable names in decompilation output with transfer learning
Binary reverse engineering is an arduous and tedious task performed by skilled and
expensive human analysts. Information about the source code is irrevocably lost in the …
expensive human analysts. Information about the source code is irrevocably lost in the …
E-XAI: Evaluating Black-Box Explainable AI Frameworks for Network Intrusion Detection
O Arreche, TR Guntur, JW Roberts, M Abdallah - IEEE Access, 2024 - ieeexplore.ieee.org
The exponential growth of intrusions on networked systems inspires new research directions
on developing artificial intelligence (AI) techniques for intrusion detection systems (IDS). In …
on developing artificial intelligence (AI) techniques for intrusion detection systems (IDS). In …
RecMaL: Rectify the malware family label via hybrid analysis
Intelligent applications can be significantly impacted by incorrectly categorized data.
Recently, artificial intelligence technology has been deployed in an increasing number of …
Recently, artificial intelligence technology has been deployed in an increasing number of …
Constructs of deceit: exploring nuances in modern social engineering attacks
Despite the increasing effort in the defense community to develop robust security solutions,
social engineering attacks are getting more prevalent every year. Detecting fraudulent …
social engineering attacks are getting more prevalent every year. Detecting fraudulent …
XAI-IDS: Toward Proposing an Explainable Artificial Intelligence Framework for Enhancing Network Intrusion Detection Systems
O Arreche, T Guntur, M Abdallah - Applied Sciences, 2024 - mdpi.com
The exponential growth of network intrusions necessitates the development of advanced
artificial intelligence (AI) techniques for intrusion detection systems (IDSs). However, the …
artificial intelligence (AI) techniques for intrusion detection systems (IDSs). However, the …
[PDF][PDF] Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation
Contrary to prevailing wisdom, we argue that the measure of binary decompiler success is
not to eliminate all gotos or reduce the complexity of the decompiled code but to get as close …
not to eliminate all gotos or reduce the complexity of the decompiled code but to get as close …
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion
Threat actor attribution is a crucial defense strategy for combating advanced persistent
threats (APTs). Cyber threat intelligence (CTI), which involves analyzing multisource …
threats (APTs). Cyber threat intelligence (CTI), which involves analyzing multisource …
Charlie, Charlie, Charlie on Industrial Control Systems: PLC Control Logic Attacks by Design, Not by Chance
Programmable logic controllers (PLCs) in industrial control systems (ICS) run a control logic
program to monitor and control critical infrastructures in real-time, such as nuclear plants …
program to monitor and control critical infrastructures in real-time, such as nuclear plants …
ADAPT it! Automating APT Campaign and Group Attribution by Leveraging and Linking Heterogeneous Files
Recent years have witnessed a surge in the growth of Advanced Persistent Threats (APTs),
with significant challenges to the security landscape, affecting industry, governance, and …
with significant challenges to the security landscape, affecting industry, governance, and …