プログラム解析

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11
データプライバシー評価
プライバシー保護技術
プログラム解析

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01
ソフトウェアセキュリティ
データフロー解析
プログラム解析

The Inconvenient Truths of Ground Truth for Binary Analysis

Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26
プログラム解析
最適化手法
関数の定義

Short Paper: Static and Microarchitectural ML-Based Approaches For Detecting Spectre Vulnerabilities and Attacks

Authors: Chidera Biringa, Gaspard Baye, Gökhan Kul | Published: 2022-10-26
プログラム解析
動的分析
動的脆弱性管理

An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17
プログラム解析
マルウェア拡散手段
動的分析

MALIGN: Explainable Static Raw-byte Based Malware Family Classification using Sequence Alignment

Authors: Shoumik Saha, Sadia Afroz, Atif Rahman | Published: 2021-11-28 | Updated: 2024-01-12
プログラム解析
マルウェア検出手法
静的分析

InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript

Authors: Saikat Dutta, Diego Garbervetsky, Shuvendu Lahiri, Max Schäfer | Published: 2021-11-18
ウェブサイト脆弱性
プログラム解析
静的分析

Certifying Decision Trees Against Evasion Attacks by Program Analysis

Authors: Stefano Calzavara, Pietro Ferrara, Claudio Lucchese | Published: 2020-07-06
プログラム解析
攻撃パターン抽出
静的分析

Backdoors in Neural Models of Source Code

Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11
バックドア攻撃
プログラム解析
ポイズニング

The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30
プログラム解析
動的分析
情報セキュリティ