A vulnerability detection algorithm based on residual graph attention networks for source code imbalance (RGAN)
M Tang, W Tang, Q Gui, J Hu, M Zhao - Expert Systems with Applications, 2024 - Elsevier
It is essential to detect potential vulnerabilities in software to ensure its safety. As software
systems become more complex, traditional static vulnerability detection methods perform …
systems become more complex, traditional static vulnerability detection methods perform …
QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries
Extensible static checking tools, such as Sys and CodeQL, have successfully discovered
bugs in source code. These tools allow analysts to write application-specific rules, referred …
bugs in source code. These tools allow analysts to write application-specific rules, referred …
[PDF][PDF] Attribution of Malware Binaries to APT Actors using an Ensemble Classifier
M Benthin - 2022 - researchgate.net
Abstract Malware Authorship Attribution is one of the most sophisticated task performed by
threat analysts, looking for similarities between malicious programs developed by the same …
threat analysts, looking for similarities between malicious programs developed by the same …