A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)

M Tang, W Tang, Q Gui, J Hu, M Zhao - Expert Systems with Applications, 2024 - Elsevier
It is essential to detect potential vulnerabilities in software to ensure its safety. As software
systems become more complex, traditional static vulnerability detection methods perform …

QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries

HS Han, JO Kyea, Y Jin, J Kang… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Extensible static checking tools, such as Sys and CodeQL, have successfully discovered
bugs in source code. These tools allow analysts to write application-specific rules, referred …

[PDF][PDF] Attribution of Malware Binaries to APT Actors using an Ensemble Classifier

M Benthin - 2022 - researchgate.net
Abstract Malware Authorship Attribution is one of the most sophisticated task performed by
threat analysts, looking for similarities between malicious programs developed by the same …