Program Analysis

Do you still need a manual smart contract audit?

Authors: Isaac David, Liyi Zhou, Kaihua Qin, Dawn Song, Lorenzo Cavallaro, Arthur Gervais | Published: 2023-06-21 | Updated: 2023-06-22
Smart Contract
Program Analysis
Threat modeling

Beware of the Unexpected: Bimodal Taint Analysis

Authors: Yiu Wai Chow, Max Schäfer, Michael Pradel | Published: 2023-01-25
Software Security
Program Analysis
Vulnerability Management

Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities

Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17
Data Collection
Program Analysis
Machine Learning Technology

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
Cyber Attack
Honeypot Technology
Program Analysis

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11
Data Privacy Assessment
Privacy Enhancing Technology
Program Analysis

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01
Software Security
Data Flow Analysis
Program Analysis

The Inconvenient Truths of Ground Truth for Binary Analysis

Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26
Program Analysis
Optimization Methods
Function Definition

Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks

Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26
Program Analysis
Dynamic Analysis
Dynamic Vulnerability Management

An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17
Program Analysis
Malware Propagation Means
Dynamic Analysis

MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment

Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12
Program Analysis
Malware Detection Method
Static Analysis