A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks
[article]
2022
arXiv
pre-print
LineVD leverages control and data dependencies between statements using graph neural networks, and a transformer-based model to encode the raw source code tokens. ...
This limits the ability of developers to efficiently inspect and interpret the predictions from a learnt model, which is crucial for integrating machine-learning based tools into the software development ...
This work was supported with supercomputing resources provided by the Phoenix HPC service at the University of Adelaide. ...
arXiv:2203.05181v2
fatcat:7p5zaogpwngf7hmadlexldenee
GCCE 2020 Subject Index
2020
2020 IEEE 9th Global Conference on Consumer Electronics (GCCE)
T U V W
Self-Attention Based Neural Network for Few Shot Classification
Self-Attention Based Neural Network for Few Shot Classification
Separation of Multiple Sound Sources in the Same Direction ...
by Instantaneous Spectral Estimation
Separation of Multiple Sound Sources in the Same Direction by Instantaneous Spectral Estimation
Sequence-To-One Neural Networks for Japanese Dialect Speech Classification ...
on Edge Devices via Statistical Weight Pruning Towards Efficient Neural Network on Edge Devices via Statistical Weight Pruning Training DNN Model with Secret Key for Model Protection Trajectory Prediction ...
doi:10.1109/gcce50665.2020.9291796
fatcat:bmnnn7xnxrefhaneq262fe4i6u
Automated Vulnerability Detection in Source Code Using Deep Representation Learning
[article]
2018
arXiv
pre-print
We leveraged the wealth of C and C++ open-source code available to develop a large-scale function-level vulnerability detection system using machine learning. ...
To supplement existing labeled vulnerability datasets, we compiled a vast dataset of millions of open-source functions and labeled it with carefully-selected findings from three different static analyzers ...
This project was sponsored by the Air Force Research Laboratory (AFRL) as part of the DARPA MUSE program. ...
arXiv:1807.04320v2
fatcat:mhke4wbfwvfpdlppzdinkoz5by
Pervasive Malware Propagation Mechanism and Mitigation Techniques
2015
International Journal of Computer Applications
Idea behind pervasive malware propagation mechanism is to provide insight towards various exploitable scenarios based on vulnerabilities and software coding flaws in the software system, its architecture ...
Understanding the control flow structure of malware propagation into the system & over the network provides greater insight into how vulnerabilities are being exploited , how target surface identification ...
Following screenshots show the process of URL embedding inside the embedded image inside a PDF file:
ANALYSIS OF MALWARE PROPAGATION MODEL PARAMETERS Using the Lotka-Volterra equations from biomathematics ...
doi:10.5120/ijca2015905893
fatcat:45qjjommbfeqdezvyo5p7djww4
Android Malware Detection via Graph Representation Learning
2021
Mobile Information Systems
Instead of directly extracting Application Programming Interface (API) call information, we further analyze the source code of Android applications to extract high-level semantic information, which increases ...
The low code coverage and poor efficiency of the dynamic analysis limit the large-scale deployment of malware detection methods based on dynamic features. ...
With the generated instruction context pairs, CGDroid utilizes the Continuous Bag-of-Words (CBOW) model to train an instruction embedding model via taking each instruction pair as a 1.
2. 3.
4.
5 ...
doi:10.1155/2021/5538841
fatcat:o4beznwd4zadvcqfqubbwgalmy
Machine Learning-based Analysis of Program Binaries: A Comprehensive Study
2019
IEEE Access
Binary code analysis is crucial in various software engineering tasks, such as malware detection, code refactoring, and plagiarism detection. ...
In this paper, we provide the taxonomy of machine learning-based binary code analysis, describe the recent advances and key findings on the topic, and discuss the key challenges and opportunities. ...
CODE-BASED FEATURES 1) TOKENS Different from program flow graph, which needs to be recovered and constructed from binaries through control or dependency analysis, a sequence of tokens (e.g., words, characters ...
doi:10.1109/access.2019.2917668
fatcat:fwjpykkdpjev7pzkhaoily4zci
Deep Neural Embedding for Software Vulnerability Discovery: Comparison and Optimization
2022
Security and Communication Networks
This paper attempts to utilize CodeBERT which is a deep contextualized model as an embedding solution to facilitate the detection of vulnerabilities in C open-source projects. ...
Experimental results show that CodeBERT-based embedding outperforms other embedding models on the downstream vulnerability detection tasks. ...
Acknowledgments is work was supported in part by the National Natural Science Foundation of China (Grant no. 62062069), Optoelectronic Information Technology Key Laboratory Open Project Fund of Yunnan ...
doi:10.1155/2022/5203217
fatcat:ymwut6l5tjfojimthrrwpdxm2a
Interrupt Verification via Thread Verification
2007
Electronical Notes in Theoretical Computer Science
Most of the research effort towards verification of concurrent software has focused on multithreaded code. ...
This paper compares and contrasts threads and interrupts from the point of view of verifying the absence of race conditions. ...
Unfortunately, there is no obvious way to check for most of these types of bugs via translation to threaded code and use of an existing thread checking tool. ...
doi:10.1016/j.entcs.2007.04.002
fatcat:zhcu4sh4yjhnxltlqu7eh77pz4
A Real-Time Face Motion Based Approach towards Modeling Socially Assistive Wireless Robot Control with Voice Recognition
2015
International Journal of Advanced Computer Science and Applications
The robotics domain has a couple of specific general design requirements which requires the close integration of planning, sensing, control and modeling and for sure the robot must take into account the ...
Thus considering the fundamental configurations, the main motive is to design a system with user-friendly interfaces that possess the ability to control embedded robotic systems by natural means. ...
the corresponding link at the HTML webpage with a tagged word written in the code. ...
doi:10.14569/ijacsa.2015.061030
fatcat:dfnfa2ixz5dp7d5wyj552m6i6m
Automatically Neutralizing Subjective Bias in Text
[article]
2019
arXiv
pre-print
An interpretable and controllable MODULAR algorithm separates these steps, using (1) a BERT-based classifier to identify problematic words and (2) a novel join embedding through which the classifier can ...
Yet bias in the form of inappropriate subjectivity - introducing attitudes via framing, presupposing truth, and casting doubt - remains ubiquitous. ...
We gratefully acknowledge support of the DARPA Communicating with Computers (CwC) program under ARO prime contract no. W911NF15-1-0462 and the NSF via grant IIS-1514268. ...
arXiv:1911.09709v3
fatcat:4cgknmoytnbx3eh7y2d2ypueca
Automatically Neutralizing Subjective Bias in Text
2020
PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE
An interpretable and controllable modular algorithm separates these steps, using (1) a BERT-based classifier to identify problematic words and (2) a novel join embedding through which the classifier can ...
Yet bias in the form of inappropriate subjectivity — introducing attitudes via framing, presupposing truth, and casting doubt — remains ubiquitous. ...
words directly from their BERT embeddings. ...
doi:10.1609/aaai.v34i01.5385
fatcat:nrl3rbeikfbcloc42iyv52szfa
Formal Verification of Concurrent Embedded Software
[chapter]
2013
IFIP Advances in Information and Communication Technology
Figure 2 . 3 . 23 The Workflow of LLVM: From Source-Code towards Binary Machine-Code two is based on MIPS [48] -a RISC computer architecture, which is introduced in Section 2.6.2. ...
The MEMICS Frontend The MEMICS Frontend generates the MEMICS Model from the input C/C++ source code. This generation process, shown in Figure 3 .2, is embedded into the LLVM compiler infrastructure. ...
The nth-root of the value in register b fp , where n is defined by the value in register c, is assigned to the register a fp . ...
doi:10.1007/978-3-642-38853-8_20
fatcat:fiyavc4llbfh3drevijahf673m
On Testing Embedded Software
[chapter]
2016
Advances in Computers
In other words, the source code and binary serves as the model of the system. Test cases are generated by searching the input space of the implemented system. ...
Such an implementation may capture the source code, the intermediate code (after various stages of compilation) or the compiled binary of an embedded software. ...
doi:10.1016/bs.adcom.2015.11.005
fatcat:lrs2hh4a2vaj7cvi7swklhbpau
Linguistic Patterns for Code Word Resilient Hate Speech Identification
2021
Sensors
In this work, we first introduced a word embedding model that learns the hidden hate speech meaning of words. ...
This approach often falls short when dealing with newer words and phrases produced by online extremist communities. These code words are used with the aim of evading automatic detection by systems. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s21237859
pmid:34883861
fatcat:o6ruflhtbzalbhvamivkrq4z34
Towards Efficiently Establishing Mutual Distrust Between Host Application and Enclave for SGX
[article]
2020
arXiv
pre-print
They can be abused to access arbitrary memory regions of its host application, jump to any code location after leaving the enclave and forge the stack register to manipulate the saved context. ...
The threats of an untrusted enclave come from the enclave-host asymmetries. ...
To engage the community, we will release the source code of our system. ...
arXiv:2010.12400v1
fatcat:mcsmo5sptbeergw63kfyel7iiy
« Previous
Showing results 1 — 15 out of 61,693 results