An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm
暂无分享,去创建一个
Xuyang Zhao | Zhangqi Zheng | Bing Zhang | Qian Wang | Jiadong Ren | Yongshan Liu | Qian Wang | Xuyang Zhao | Jiadong Ren | Qian Wang | Bing Zhang | Zhangqi Zheng | Yongshan Liu
[1] Babak Sadeghiyan,et al. Smart fuzzing method for detecting stack-based buffer overflow in binary codes , 2016, IET Softw..
[2] Jingbo Yuan,et al. Identifying buffer overflow vulnerabilities based on binary code , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.
[3] Onur Ozdemir,et al. Automated Vulnerability Detection in Source Code Using Deep Representation Learning , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).
[4] Niu Wei-n. Vulnerability Finding Using Symbolic Execution on Binary Programs , 2013 .
[5] Jeffrey Dean,et al. Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.
[6] Xiangyu Zhang,et al. IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking across Multiple Precisions , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).
[7] Shouhuai Xu,et al. VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.
[8] Haibin Cheng,et al. Real-time Personalization using Embeddings for Search Ranking at Airbnb , 2018, KDD.
[9] Ping Han,et al. A combined online-learning model with K-means clustering and GRU neural networks for trajectory prediction , 2021, Ad Hoc Networks.
[10] Tracy Hall,et al. Automatically identifying code features for software defect prediction: Using AST N-grams , 2019, Inf. Softw. Technol..
[11] Wang,et al. Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing , 2014 .
[12] Haibing Guan,et al. Static program analysis assisted dynamic taint tracking for software vulnerability discovery , 2012, Comput. Math. Appl..
[13] Jürgen Schmidhuber,et al. LSTM recurrent networks learn simple context-free and context-sensitive languages , 2001, IEEE Trans. Neural Networks.
[14] Qing Zhu,et al. Effective long short-term memory with fruit fly optimization algorithm for time series forecasting , 2020, Soft Computing.
[15] Hee Beng Kuan Tan,et al. Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.
[16] Issa Traoré,et al. Empirical relation between coupling and attackability in software systems:: a case study on DOS , 2006, PLAS '06.
[17] Yoshua Bengio,et al. A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..
[18] Alessandro Orso,et al. Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.
[19] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[20] Qing-Long Han,et al. DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection , 2020, IEEE Transactions on Fuzzy Systems.
[21] V. Ganapathy,et al. Automatic discovery of API-level exploits , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..
[22] Heejo Lee,et al. Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution , 2013, 2013 International Conference on Availability, Reliability and Security.
[23] Yoshua Bengio,et al. Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.
[24] Bin Zhang,et al. Detecting integer overflow in Windows binary executables based on symbolic execution , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
[25] Lauri Malmi,et al. Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: An Experiment with Sorting Algorithms , 2011, Comput. J..
[26] Mehdi R. Zargham,et al. Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database , 2013, IEEE Transactions on Reliability.
[27] Zoubin Ghahramani,et al. A Theoretically Grounded Application of Dropout in Recurrent Neural Networks , 2015, NIPS.
[28] Aditya K. Ghose,et al. Lessons Learned from Using a Deep Tree-Based Model for Software Defect Prediction in Practice , 2019, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR).
[29] Hoa Khanh Dam,et al. Automatic Feature Learning for Predicting Vulnerable Software Components , 2021, IEEE Transactions on Software Engineering.
[30] Yang Zhang,et al. Improving Accuracy of Static Integer Overflow Detection in Binary , 2015, RAID.
[31] Baldoino Fonseca dos Santos Neto,et al. Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study , 2016, 2016 12th European Dependable Computing Conference (EDCC).
[32] Norman F. Schneidewind,et al. Methodology For Validating Software Metrics , 1992, IEEE Trans. Software Eng..
[33] Kuldeep Kumar,et al. Empirical analysis of change metrics for software fault prediction , 2018, Comput. Electr. Eng..