Software Security

Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study

Authors: SM Zobaed, Mohsen Amini Salehi | Published: 2023-07-31
TEE Implementation
Software Security
Data Management System

Survey of Malware Analysis through Control Flow Graph using Machine Learning

Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal | Published: 2023-05-15 | Updated: 2023-06-20
Graph Neural Network
Software Security
Static Analysis

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02
Watermarking
Software Security
Vulnerability Analysis

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25
Software Security
Program Analysis
Vulnerability Management

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01
Software Security
Data Flow Analysis
Program Analysis

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13
Security Assurance
Software Security
Evaluation Method

Multi-feature Dataset for Windows PE Malware Classification

Authors: Muhammad Irfan Yousuf, Izza Anwer, Tanzeela Shakir, Minahil Siddiqui, Maysoon Shahid | Published: 2022-10-28
Software Security
Challenges of Data Labeling
Classification of Malicious Actors

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
Cyber Threat
Software Security
Vulnerability Management

GANG-MAM: GAN based enGine for Modifying Android Malware

Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27
Software Security
Malware Detection Method
Adversarial attack

POSSE: Patterns of Systems During Software Encryption

Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24
Software Security
Performance Evaluation
Machine Learning Application