A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using ML and Data-Mining Techniques in Automatic Vulnerability Software Discovery
2021
International Journal of Advanced Trends in Computer Science and Engineering
Today's age is Machine Learning (ML) and Data-Mining (DM) Techniques, as both techniques play a significant role in measuring vulnerability prediction accuracy. ...
The meaning of using weakness with the same risk might go to misperception. ...
Further study appraised that C and C++ open-source code present a large-scale function level for vulnerability detection using ML. ...
doi:10.30534/ijatcse/2021/871032021
fatcat:fhx2y72a5fdadmj2yyqqjnj37i
Fuzzing: a survey
2018
Cybersecurity
Firstly, we discuss the reason why fuzzing is popular, by comparing different commonly used vulnerability discovery techniques. ...
In recent years, fuzzing solutions, like AFL, have made great improvements in vulnerability discovery. ...
Compared with other techniques, fuzzing requires few knowledge of targets and could be easily scaled up to large applications, and thus has become the most popular vulnerability discovery solution, especially ...
doi:10.1186/s42400-018-0002-y
fatcat:3xvvipq7gfbkxl55h5desnqpiq
Bin2vec: Learning Representations of Binary Executable Programs for Security Tasks
[article]
2021
arXiv
pre-print
We demonstrate the versatility of this approach by using our representations to solve two semantically different binary analysis tasks - functional algorithm classification and vulnerability discovery. ...
We evaluated Bin2vec on 49191 binaries for the functional algorithm classification task, and on 30 different CWE-IDs including at least 100 CVE entries each for the vulnerability discovery task. ...
Due to the large variability among vulnerabilities, increasingly large sizes of software and increasing costs of testing it, the problem of vulnerability discovery is not solved. ...
arXiv:2002.03388v2
fatcat:jgbkymwohrax3nkm5a2biqwub4
Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning
[article]
2017
arXiv
pre-print
As a result of our work, we responsibly disclosed five vulnerabilities, established three new CVE-IDs, and illuminated a common insecure practice across many machine learning systems. ...
learning techniques. ...
We use American Fuzzy Lop (AFL) [36] to instrument and fuzz-test machine learning programs. ...
arXiv:1701.04739v1
fatcat:nwkbcoh2ozhy7pmtmtxv4jctti
A systematic review of fuzzing based on machine learning techniques
2020
PLoS ONE
Security vulnerabilities play a vital role in network security system. Fuzzing technology is widely used as a vulnerability discovery technology to reduce damage in advance. ...
Firstly, this paper discusses the reasons why machine learning techniques can be used for fuzzing scenarios and identifies five different stages in which machine learning has been used. ...
Online classifiers allow models to scale well even for large numbers of crashes by incremental learning, while being easy to update for new crashes. ...
doi:10.1371/journal.pone.0237749
pmid:32810156
fatcat:j33n55wjg5hmvndnu2payv3zfy
A Review on Latest Technologies in Big Data Analysis
2018
International Journal of Engineering & Technology
Some of the digital technologies such as cloud computing and Internet of Things (IoT) are considered as the major sources of such large data. ...
In this digital world, the modern information systems have produced a large amount of data which needs huge depositary in terms of terabytes for storage. ...
Towards this direction, several researches and surveys have been done by employing machine learning approaches with minimum storage requirements. ...
doi:10.14419/ijet.v7i3.1.16806
fatcat:fvxtqfgysrhtbiakgnvowceyhm
Towards Compliant Data Management Systems for Healthcare ML
[article]
2020
arXiv
pre-print
Together, these represent first efforts towards building a compliant data management system for healthcare machine learning projects. ...
We review how data flows within machine learning projects in healthcare from source to storage to use in training algorithms and beyond. ...
However, it may not scale well to large data inputs and its usage-APIs are implemented only in python and R. ...
arXiv:2011.07555v1
fatcat:hkygwivw3ncavm3slf6bkv3e2u
Machine Knowledge: Information Studies and Artificial Intelligence in Dialogue
2018
Proceedings of the Annual Conference of CAIS / Actes du congrès annuel de l'ACSI
In this piece, we examine the parallels and contrasts between knowledge organization and data science with a focus on the subfields of AI and machine learning in particular. ...
transparency.Dans cet article, nous examinons les parallèles et les contrastes entre l'organisation des connaissances et la science des données en mettant l'accent sur les sous-domaines de l'IA et de l'apprentissage machine ...
Computational approaches that exploit large-sized datasets are becoming increasingly mainstream in many fields as they offer new possibilities for analysis and making discoveries. ...
doi:10.29173/cais971
fatcat:47mqo2ywbze7jgr7vyahkj7uou
Machine Learning-based Analysis of Program Binaries: A Comprehensive Study
2019
IEEE Access
To meet these challenges, machine learning-based binary code analysis frameworks attract substantial attention due to their automated feature extraction and drastically reduced efforts needed on large-scale ...
INDEX TERMS Machine learning, program binary analysis, taxonomy. ...
VULNERABILITY DISCOVERY Machine learning-based BCAs are also applied successfully in vulnerability discovery field. ...
doi:10.1109/access.2019.2917668
fatcat:fwjpykkdpjev7pzkhaoily4zci
Guest Editorial Deep Learning Models for Industry Informatics
2018
IEEE Transactions on Industrial Informatics
The fourteenth paper entitled, "Cross-Project Transfer Representation Learning for Vulnerable Function Discovery" authored by Lin et al. presents the cold-start problem of machine learning, by learning ...
Many individuals have contributed toward the success of this issue. ...
doi:10.1109/tii.2018.2834547
fatcat:m453tboxz5d6tk3cpipqbknpfi
Intrusion Detection System for Large Scale Data using Machine Learning Algorithms
2019
International Journal of Engineering and Advanced Technology
The result section will show how proposed system is better than classical machine learning algorithms. ...
Due to various network attacks it is very hard to detect malicious activities from remote user as well as remote machines. ...
Intrusion Detection System for Large Scale Data using Machine Learning Algorithms Accuracy and detection rate stated by this method are 85% and 81% respectively. ...
doi:10.35940/ijeat.f7971.088619
fatcat:dseiyikuxrgjdl3lg46pxopdr4
Malware: a future framework for device, network and service management
2007
Journal in Computer Virology
from them and that network management, which is the activity supposed to prevent them, can actually benefit from their use. ...
We focus on five lessons learned from current malware that can benefit to the network management community. ...
One solution towards the identification of such a user category is a large scale distributed overlay honeypot. ...
doi:10.1007/s11416-007-0037-1
fatcat:sut33x47hjeajcdz66xo4t7jjy
Machine Learning for Security and the Internet of Things: the Good, the Bad, and the Ugly
2019
IEEE Access
More pressing, we consider the vulnerabilities of machine learning (bad use) from the perspectives of security and CPS/IoT, including the ways in which machine learning systems can be compromised, misled ...
In this paper, we consider the good, the bad, and the ugly use of machine learning for cybersecurity and CPS/IoT. ...
Thus, as immanently needed research, the discovery of vulnerabilities in existing systems, the development of defensive approaches, and the discovery of vulnerabilities in defensive strategies are critical ...
doi:10.1109/access.2019.2948912
fatcat:wxd6imn62fgufdmfh3gtaijeru
Big Data Approach towards Networking, Data Transfer, IOT and Security: A Review
2019
Zenodo
Big Data has emerged as an advanced discovery for large scale data collection. Data generated by large instruments that generates semi structured and unstructured information. ...
Thus, in this Big data technology, particularly machine learning, has been widely used for intrusion/anomaly detection, little has been done in networking that is developed by software. ...
Big data instruments and algorithms are widely used to disallow these attacks, especially supervised way of Journal of Web Development and Web Designing Volume 4 Issue 3 mechanisms, machine and deep learning ...
doi:10.5281/zenodo.3413933
fatcat:xmg6n4bjazamni6dzwglbjbr3i
Instruction2vec: Efficient Preprocessor of Assembly Code to Detect Software Weakness with CNN
2019
Applied Sciences
To overcome this limitation, we propose a new method—Instruction2vec—an improved static binary analysis technique using machine. ...
Our framework consists of two steps: (1) it models assembly code efficiently using Instruction2vec, based on Word2vec; and (2) it learns the features of software weakness code using the feature extraction ...
Grieco introduced a new approach in "Toward large-scale vulnerability discovery using machine learning" [16] in 2016. ...
doi:10.3390/app9194086
fatcat:dpmasa3dkrbzbicqtm3c2c2ptu
« Previous
Showing results 1 — 15 out of 27,128 results