脆弱性分析

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22
テスト優先順位付け
脆弱性分析
評価手法

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22
攻撃者の行動分析
脆弱性分析
脆弱性検出

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05
ロバスト性評価
信頼評価モジュール
脆弱性分析

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks

Authors: David Hin, Andrey Kan, Huaming Chen, M. Ali Babar | Published: 2022-03-10 | Updated: 2022-03-25
グラフニューラルネットワーク
深層学習手法
脆弱性分析

Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges

Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17
バックドア攻撃
メンバーシップ推論
脆弱性分析

PORTFILER: Port-Level Network Profiling for Self-Propagating Malware Detection

Authors: Talha Ongun, Oliver Spohngellert, Benjamin Miller, Simona Boboila, Alina Oprea, Tina Eliassi-Rad, Jason Hiser, Alastair Nottingham, Jack Davidson, Malathi Veeraraghavan | Published: 2021-12-27 | Updated: 2022-05-24
特徴エンジニアリング
脆弱性分析
通信解析

Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers

Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07
コード変更分析
特徴選択手法
脆弱性分析

Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Authors: Zeki Bilgin | Published: 2021-05-07
コード変更分析
トークン分布分析
脆弱性分析

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06
クラス不均衡
データ前処理
脆弱性分析

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04
ハードウェアセキュリティ
敵対的サンプルの脆弱性
脆弱性分析