Understanding Programs by Exploiting (Fuzzing) Test Cases Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12 Code Change AnalysisProgram UnderstandingIntellectual Property Protection 2023.05.23 2025.05.28 Literature Database
A Natural Language Processing Approach for Instruction Set Architecture Identification Authors: Dinuka Sahabandu, Sukarno Mertoguno, Radha Poovendran | Published: 2022-04-13 Data Extraction and AnalysisProgram UnderstandingMachine Learning Application 2022.04.13 2025.05.28 Literature Database
Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning Authors: Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent | Published: 2019-11-18 Program UnderstandingModel Performance EvaluationRole of Machine Learning 2019.11.18 2025.05.28 Literature Database
A Practical Approach to the Automatic Classification of Security-Relevant Commits Authors: Antonino Sabetta, Michele Bezzi | Published: 2018-07-06 Automation of CybersecurityData-Driven Vulnerability AssessmentProgram Understanding 2018.07.06 2025.05.28 Literature Database