SAFE: Self-Attentive Function Embeddings for Binary Similarity [PDF]
The binary similarity problem consists in determining if two functions are similar by only considering their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright ...
Baldoni, Roberto +4 more
core +2 more sources
Cross-Architecture Vulnerability Detection Combining Semantic and Attribute Feature [PDF]
Binary vulnerability detection plays an important role in the field of program security. In order to cope with large-scale vulnerability detection tasks, more and more neural network technologies have been applied to cross-architecture vulnerability ...
LI Kun, LI Bin, ZHU Wenjing, ZHOU Qinglei
doaj +1 more source
Robust semicoherent searches for continuous gravitational waves with noise and signal models including hours to days long transients [PDF]
The vulnerability to single-detector instrumental artifacts in standard detection methods for long-duration quasimonochromatic gravitational waves from nonaxisymmetric rotating neutron stars [continuous waves (CWs)] was addressed in past work [D.
Keitel, David
core +3 more sources
Configuration Fuzzing for Software Vulnerability Detection [PDF]
Many software security vulnerabilities only reveal themselves under certain conditions, i.e., particular configurations of the software together with its particular runtime environment. One approach to detecting these vulnerabilities is fuzz testing, which feeds a range of randomly modified inputs to a software application while monitoring it for ...
Dai, Huning +2 more
openaire +3 more sources
Escrow: A large-scale web vulnerability assessment tool [PDF]
The reliance on Web applications has increased rapidly over the years. At the same time, the quantity and impact of application security vulnerabilities have grown as well.
Delamore, Baden, Ko, Ryan K.L.
core +2 more sources
A taxonomy of malicious traffic for intrusion detection systems [PDF]
With the increasing number of network threats it is essential to have a knowledge of existing and new network threats to design better intrusion detection systems.
Atkinson, Robert +5 more
core +4 more sources
CBGRU: A Detection Method of Smart Contract Vulnerability Based on a Hybrid Model
In the context of the rapid development of blockchain technology, smart contracts have also been widely used in the Internet of Things, finance, healthcare, and other fields.
Lejun Zhang +6 more
doaj +1 more source
PreNNsem: A Heterogeneous Ensemble Learning Framework for Vulnerability Detection in Software
Automated vulnerability detection is one of the critical issues in the realm of software security. Existing solutions to this problem are mostly based on features that are defined by human experts and directly lead to missed potential vulnerability. Deep
Lu Wang +5 more
doaj +1 more source
Detecting C Program Vulnerabilities
C/C++ language is widely used for developing tools in various applications, in particular, software tools for critical systems are often written in C language. Therefore, the security of such software should be thoroughly tested, i.e., the absence of vulnerabilities has to be confirmed.
Anton, Ermakov, Natalia, Kushik
openaire +2 more sources
Detecting the vulnerable plaque in patients [PDF]
AbstractAtherosclerosis is a systemic condition that eventually evolves into vulnerable plaques and cardiovascular events. Pathology studies reveal that rupture‐prone atherosclerotic plaques have a distinct morphology, namely a thin, inflamed fibrous cap covering a large lipidic and necrotic core.
I, Gonçalves +3 more
openaire +2 more sources

