A survey of human-in-the-loop for machine learning

X Wu, L Xiao, Y Sun, J Zhang, T Ma, L He - Future Generation Computer …, 2022 - Elsevier
Abstract Machine learning has become the state-of-the-art technique for many tasks
including computer vision, natural language processing, speech processing tasks, etc …

Ijon: Exploring deep state spaces via fuzzing

C Aschermann, S Schumilo, A Abbasi… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Although current fuzz testing (fuzzing) methods are highly effective, there are still many
situations such as complex state machines where fully automated approaches fail. State-of …

Hackers vs. testers: A comparison of software vulnerability discovery processes

D Votipka, R Stevens, E Redmiles, J Hu… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …

Continuous security testing: A case study on integrating dynamic security testing tools in ci/cd pipelines

T Rangnau, R Buijtenen, F Fransen… - 2020 IEEE 24th …, 2020 - ieeexplore.ieee.org
Continuous Integration (CI) and Continuous Delivery (CD) have become a well-known
practice in DevOps to ensure fast delivery of new features. This is achieved by automatically …

A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices

M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …

An observational investigation of reverse {Engineers'} processes

D Votipka, S Rabin, K Micinski, JS Foster… - 29th USENIX Security …, 2020 - usenix.org
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …

Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it

D Votipka, KR Fulton, J Parker, M Hou… - 29th USENIX Security …, 2020 - usenix.org
Secure software development is a challenging task requiring consideration of many possible
threats and mitigations. This paper investigates how and why programmers, despite a …

Bug synthesis: Challenging bug-finding tools with deep faults

S Roy, A Pandey, B Dolan-Gavitt, Y Hu - … of the 2018 26th ACM Joint …, 2018 - dl.acm.org
In spite of decades of research in bug detection tools, there is a surprising dearth of ground-
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …

[PDF][PDF] len or index or count, anything but v1”: Predicting variable names in decompilation output with transfer learning

KK Pal, AP Bajaj, P Banerjee, A Dutcher… - 2024 IEEE Symposium …, 2024 - yancomm.net
Binary reverse engineering is an arduous and tedious task performed by skilled and
expensive human analysts. Information about the source code is irrevocably lost in the …

Threat intelligence computing

X Shu, F Araujo, DL Schales, MP Stoecklin… - Proceedings of the …, 2018 - dl.acm.org
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …