An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm

[1]  Babak Sadeghiyan,et al.  Smart fuzzing method for detecting stack-based buffer overflow in binary codes , 2016, IET Softw..

[2]  Jingbo Yuan,et al.  Identifying buffer overflow vulnerabilities based on binary code , 2011, 2011 IEEE International Conference on Computer Science and Automation Engineering.

[3]  Onur Ozdemir,et al.  Automated Vulnerability Detection in Source Code Using Deep Representation Learning , 2018, 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA).

[4]  Niu Wei-n Vulnerability Finding Using Symbolic Execution on Binary Programs , 2013 .

[5]  Jeffrey Dean,et al.  Efficient Estimation of Word Representations in Vector Space , 2013, ICLR.

[6]  Xiangyu Zhang,et al.  IntEQ: Recognizing Benign Integer Overflows via Equivalence Checking across Multiple Precisions , 2016, 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE).

[7]  Shouhuai Xu,et al.  VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.

[8]  Haibin Cheng,et al.  Real-time Personalization using Embeddings for Search Ranking at Airbnb , 2018, KDD.

[9]  Ping Han,et al.  A combined online-learning model with K-means clustering and GRU neural networks for trajectory prediction , 2021, Ad Hoc Networks.

[10]  Tracy Hall,et al.  Automatically identifying code features for software defect prediction: Using AST N-grams , 2019, Inf. Softw. Technol..

[11]  Wang,et al.  Detecting Integer Overflow Vulnerabilities in Binary Executables Based on Target Filtering and Dynamic Taint Tracing , 2014 .

[12]  Haibing Guan,et al.  Static program analysis assisted dynamic taint tracking for software vulnerability discovery , 2012, Comput. Math. Appl..

[13]  Jürgen Schmidhuber,et al.  LSTM recurrent networks learn simple context-free and context-sensitive languages , 2001, IEEE Trans. Neural Networks.

[14]  Qing Zhu,et al.  Effective long short-term memory with fruit fly optimization algorithm for time series forecasting , 2020, Soft Computing.

[15]  Hee Beng Kuan Tan,et al.  Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis , 2014, 2014 IEEE 38th Annual Computer Software and Applications Conference.

[16]  Issa Traoré,et al.  Empirical relation between coupling and attackability in software systems:: a case study on DOS , 2006, PLAS '06.

[17]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[18]  Alessandro Orso,et al.  Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.

[19]  Yoshua Bengio,et al.  Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.

[20]  Qing-Long Han,et al.  DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection , 2020, IEEE Transactions on Fuzzy Systems.

[21]  V. Ganapathy,et al.  Automatic discovery of API-level exploits , 2005, Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..

[22]  Heejo Lee,et al.  Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution , 2013, 2013 International Conference on Availability, Reliability and Security.

[23]  Yoshua Bengio,et al.  Understanding the difficulty of training deep feedforward neural networks , 2010, AISTATS.

[24]  Bin Zhang,et al.  Detecting integer overflow in Windows binary executables based on symbolic execution , 2016, 2016 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).

[25]  Lauri Malmi,et al.  Recognizing Algorithms Using Language Constructs, Software Metrics and Roles of Variables: An Experiment with Sorting Algorithms , 2011, Comput. J..

[26]  Mehdi R. Zargham,et al.  Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database , 2013, IEEE Transactions on Reliability.

[27]  Zoubin Ghahramani,et al.  A Theoretically Grounded Application of Dropout in Recurrent Neural Networks , 2015, NIPS.

[28]  Aditya K. Ghose,et al.  Lessons Learned from Using a Deep Tree-Based Model for Software Defect Prediction in Practice , 2019, 2019 IEEE/ACM 16th International Conference on Mining Software Repositories (MSR).

[29]  Hoa Khanh Dam,et al.  Automatic Feature Learning for Predicting Vulnerable Software Components , 2021, IEEE Transactions on Software Engineering.

[30]  Yang Zhang,et al.  Improving Accuracy of Static Integer Overflow Detection in Binary , 2015, RAID.

[31]  Baldoino Fonseca dos Santos Neto,et al.  Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study , 2016, 2016 12th European Dependable Computing Conference (EDCC).

[32]  Norman F. Schneidewind,et al.  Methodology For Validating Software Metrics , 1992, IEEE Trans. Software Eng..

[33]  Kuldeep Kumar,et al.  Empirical analysis of change metrics for software fault prediction , 2018, Comput. Electr. Eng..