Filters








61,693 Hits in 6.6 sec

LineVD: Statement-level Vulnerability Detection using Graph Neural Networks [article]

David Hin, Andrey Kan, Huaming Chen, M. Ali Babar
2022 arXiv   pre-print
LineVD leverages control and data dependencies between statements using graph neural networks, and a transformer-based model to encode the raw source code tokens.  ...  This limits the ability of developers to efficiently inspect and interpret the predictions from a learnt model, which is crucial for integrating machine-learning based tools into the software development  ...  This work was supported with supercomputing resources provided by the Phoenix HPC service at the University of Adelaide.  ... 
arXiv:2203.05181v2 fatcat:7p5zaogpwngf7hmadlexldenee

GCCE 2020 Subject Index

2020 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)  
T U V W Self-Attention Based Neural Network for Few Shot Classification Self-Attention Based Neural Network for Few Shot Classification Separation of Multiple Sound Sources in the Same Direction  ...  by Instantaneous Spectral Estimation Separation of Multiple Sound Sources in the Same Direction by Instantaneous Spectral Estimation Sequence-To-One Neural Networks for Japanese Dialect Speech Classification  ...  on Edge Devices via Statistical Weight Pruning Towards Efficient Neural Network on Edge Devices via Statistical Weight Pruning Training DNN Model with Secret Key for Model Protection Trajectory Prediction  ... 
doi:10.1109/gcce50665.2020.9291796 fatcat:bmnnn7xnxrefhaneq262fe4i6u

Automated Vulnerability Detection in Source Code Using Deep Representation Learning [article]

Rebecca L. Russell, Louis Kim, Lei H. Hamilton, Tomo Lazovich, Jacob A. Harer, Onur Ozdemir, Paul M. Ellingwood, Marc W. McConley
2018 arXiv   pre-print
We leveraged the wealth of C and C++ open-source code available to develop a large-scale function-level vulnerability detection system using machine learning.  ...  To supplement existing labeled vulnerability datasets, we compiled a vast dataset of millions of open-source functions and labeled it with carefully-selected findings from three different static analyzers  ...  This project was sponsored by the Air Force Research Laboratory (AFRL) as part of the DARPA MUSE program.  ... 
arXiv:1807.04320v2 fatcat:mhke4wbfwvfpdlppzdinkoz5by

Pervasive Malware Propagation Mechanism and Mitigation Techniques

Amit Kumar, Pallavi Kulkarni
2015 International Journal of Computer Applications  
Idea behind pervasive malware propagation mechanism is to provide insight towards various exploitable scenarios based on vulnerabilities and software coding flaws in the software system, its architecture  ...  Understanding the control flow structure of malware propagation into the system & over the network provides greater insight into how vulnerabilities are being exploited , how target surface identification  ...  Following screenshots show the process of URL embedding inside the embedded image inside a PDF file: ANALYSIS OF MALWARE PROPAGATION MODEL PARAMETERS Using the Lotka-Volterra equations from biomathematics  ... 
doi:10.5120/ijca2015905893 fatcat:45qjjommbfeqdezvyo5p7djww4

Android Malware Detection via Graph Representation Learning

Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu, Raul Montoliu
2021 Mobile Information Systems  
Instead of directly extracting Application Programming Interface (API) call information, we further analyze the source code of Android applications to extract high-level semantic information, which increases  ...  The low code coverage and poor efficiency of the dynamic analysis limit the large-scale deployment of malware detection methods based on dynamic features.  ...  With the generated instruction context pairs, CGDroid utilizes the Continuous Bag-of-Words (CBOW) model to train an instruction embedding model via taking each instruction pair as a 1. 2. 3. 4. 5  ... 
doi:10.1155/2021/5538841 fatcat:o4beznwd4zadvcqfqubbwgalmy

Machine Learning-based Analysis of Program Binaries: A Comprehensive Study

Hongfa Xue, Shaowen Sun, Guru Venkataramani, Tian Lan
2019 IEEE Access  
Binary code analysis is crucial in various software engineering tasks, such as malware detection, code refactoring, and plagiarism detection.  ...  In this paper, we provide the taxonomy of machine learning-based binary code analysis, describe the recent advances and key findings on the topic, and discuss the key challenges and opportunities.  ...  CODE-BASED FEATURES 1) TOKENS Different from program flow graph, which needs to be recovered and constructed from binaries through control or dependency analysis, a sequence of tokens (e.g., words, characters  ... 
doi:10.1109/access.2019.2917668 fatcat:fwjpykkdpjev7pzkhaoily4zci

Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization

Xue Yuan, Guanjun Lin, Yonghang Tai, Jun Zhang, Weizhi Meng
2022 Security and Communication Networks  
This paper attempts to utilize CodeBERT which is a deep contextualized model as an embedding solution to facilitate the detection of vulnerabilities in C open-source projects.  ...  Experimental results show that CodeBERT-based embedding outperforms other embedding models on the downstream vulnerability detection tasks.  ...  Acknowledgments is work was supported in part by the National Natural Science Foundation of China (Grant no. 62062069), Optoelectronic Information Technology Key Laboratory Open Project Fund of Yunnan  ... 
doi:10.1155/2022/5203217 fatcat:ymwut6l5tjfojimthrrwpdxm2a

Interrupt Verification via Thread Verification

John Regehr, Nathan Cooprider
2007 Electronical Notes in Theoretical Computer Science  
Most of the research effort towards verification of concurrent software has focused on multithreaded code.  ...  This paper compares and contrasts threads and interrupts from the point of view of verifying the absence of race conditions.  ...  Unfortunately, there is no obvious way to check for most of these types of bugs via translation to threaded code and use of an existing thread checking tool.  ... 
doi:10.1016/j.entcs.2007.04.002 fatcat:zhcu4sh4yjhnxltlqu7eh77pz4

A Real-Time Face Motion Based Approach towards Modeling Socially Assistive Wireless Robot Control with Voice Recognition

Abhinaba Bhattacharjee, Partha Das, Debasish Kundu, Sudipta Ghosh, Sauvik Das
2015 International Journal of Advanced Computer Science and Applications  
The robotics domain has a couple of specific general design requirements which requires the close integration of planning, sensing, control and modeling and for sure the robot must take into account the  ...  Thus considering the fundamental configurations, the main motive is to design a system with user-friendly interfaces that possess the ability to control embedded robotic systems by natural means.  ...  the corresponding link at the HTML webpage with a tagged word written in the code.  ... 
doi:10.14569/ijacsa.2015.061030 fatcat:dfnfa2ixz5dp7d5wyj552m6i6m

Automatically Neutralizing Subjective Bias in Text [article]

Reid Pryzant, Richard Diehl Martinez, Nathan Dass, Sadao Kurohashi, Dan Jurafsky, Diyi Yang
2019 arXiv   pre-print
An interpretable and controllable MODULAR algorithm separates these steps, using (1) a BERT-based classifier to identify problematic words and (2) a novel join embedding through which the classifier can  ...  Yet bias in the form of inappropriate subjectivity - introducing attitudes via framing, presupposing truth, and casting doubt - remains ubiquitous.  ...  We gratefully acknowledge support of the DARPA Communicating with Computers (CwC) program under ARO prime contract no. W911NF15-1-0462 and the NSF via grant IIS-1514268.  ... 
arXiv:1911.09709v3 fatcat:4cgknmoytnbx3eh7y2d2ypueca

Automatically Neutralizing Subjective Bias in Text

Reid Pryzant, Richard Diehl Martinez, Nathan Dass, Sadao Kurohashi, Dan Jurafsky, Diyi Yang
2020 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
An interpretable and controllable modular algorithm separates these steps, using (1) a BERT-based classifier to identify problematic words and (2) a novel join embedding through which the classifier can  ...  Yet bias in the form of inappropriate subjectivity — introducing attitudes via framing, presupposing truth, and casting doubt — remains ubiquitous.  ...  words directly from their BERT embeddings.  ... 
doi:10.1609/aaai.v34i01.5385 fatcat:nrl3rbeikfbcloc42iyv52szfa

Formal Verification of Concurrent Embedded Software [chapter]

Dirk Nowotka, Johannes Traub
2013 IFIP Advances in Information and Communication Technology  
Figure 2 . 3 . 23 The Workflow of LLVM: From Source-Code towards Binary Machine-Code two is based on MIPS [48] -a RISC computer architecture, which is introduced in Section 2.6.2.  ...  The MEMICS Frontend The MEMICS Frontend generates the MEMICS Model from the input C/C++ source code. This generation process, shown in Figure 3 .2, is embedded into the LLVM compiler infrastructure.  ...  The nth-root of the value in register b fp , where n is defined by the value in register c, is assigned to the register a fp .  ... 
doi:10.1007/978-3-642-38853-8_20 fatcat:fiyavc4llbfh3drevijahf673m

On Testing Embedded Software [chapter]

Abhijeet Banerjee, Sudipta Chattopadhyay, Abhik Roychoudhury
2016 Advances in Computers  
In other words, the source code and binary serves as the model of the system. Test cases are generated by searching the input space of the implemented system.  ...  Such an implementation may capture the source code, the intermediate code (after various stages of compilation) or the compiled binary of an embedded software.  ... 
doi:10.1016/bs.adcom.2015.11.005 fatcat:lrs2hh4a2vaj7cvi7swklhbpau

Linguistic Patterns for Code Word Resilient Hate Speech Identification

Fernando H. Calderón, Namrita Balani, Jherez Taylor, Melvyn Peignon, Yen-Hao Huang, Yi-Shin Chen
2021 Sensors  
In this work, we first introduced a word embedding model that learns the hidden hate speech meaning of words.  ...  This approach often falls short when dealing with newer words and phrases produced by online extremist communities. These code words are used with the aim of evading automatic detection by systems.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21237859 pmid:34883861 fatcat:o6ruflhtbzalbhvamivkrq4z34

Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX [article]

Yuan Chen, Jiaqi Li, Guorui Xu, Yajin Zhou, Zhi Wang, Cong Wang, Kui Ren
2020 arXiv   pre-print
They can be abused to access arbitrary memory regions of its host application, jump to any code location after leaving the enclave and forge the stack register to manipulate the saved context.  ...  The threats of an untrusted enclave come from the enclave-host asymmetries.  ...  To engage the community, we will release the source code of our system.  ... 
arXiv:2010.12400v1 fatcat:mcsmo5sptbeergw63kfyel7iiy
« Previous Showing results 1 — 15 out of 61,693 results