Program Analysis

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
Cyber Attack
Honeypot Technology
Program Analysis

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11
Data Privacy Assessment
Privacy Enhancing Technology
Program Analysis

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01
Software Security
Data Flow Analysis
Program Analysis

The Inconvenient Truths of Ground Truth for Binary Analysis

Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26
Program Analysis
Optimization Methods
Function Definition

Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks

Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26
Program Analysis
Dynamic Analysis
Dynamic Vulnerability Management

An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17
Program Analysis
Malware Propagation Means
Dynamic Analysis

MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment

Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12
Program Analysis
Malware Detection Method
Static Analysis

InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript

Authors: Saikat Dutta, Diego Garbervetsky, Shuvendu Lahiri, Max Schäfer | Published: 2021-11-18
Website Vulnerability
Program Analysis
Static Analysis

Certifying Decision Trees Against Evasion Attacks by Program Analysis

Authors: Stefano Calzavara, Pietro Ferrara, Claudio Lucchese | Published: 2020-07-06
Program Analysis
Attack Pattern Extraction
Static Analysis

Backdoors in Neural Models of Source Code

Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11
Backdoor Attack
Program Analysis
Poisoning