Software vulnerability analysis and discovery using machine-learning and data-mining techniques: A survey

SM Ghaffarian, HR Shahriari - ACM computing surveys (CSUR), 2017 - dl.acm.org
Software security vulnerabilities are one of the critical issues in the realm of computer
security. Due to their potential high severity impacts, many different approaches have been …

A deep learning framework for predicting cyber attacks rates

X Fang, M Xu, S Xu, P Zhao - EURASIP Journal on Information security, 2019 - Springer
Like how useful weather forecasting is, the capability of forecasting or predicting cyber
threats can never be overestimated. Previous investigations show that cyber attack data …

Jadeite: a novel image-behavior-based approach for java malware detection using deep learning

I Obaidat, M Sridhar, KM Pham, PH Phung - Computers & Security, 2022 - Elsevier
Java malware exploiting language vulnerabilities has become increasingly prevalent in the
recent past. Since Java is a platform-independent language, these security threats open up …

Systematic identification of threats in the cloud: A survey

JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais… - Computer Networks, 2019 - Elsevier
When a vulnerability is discovered in a system, some key questions often asked by the
security analyst are what threat (s) does it pose, what attacks may exploit it, and which parts …

A study on container vulnerability exploit detection

O Tunde-Onadele, J He, T Dai… - 2019 ieee international …, 2019 - ieeexplore.ieee.org
Containers have become increasingly popular for deploying applications in cloud computing
infrastructures. However, recent studies have shown that containers are prone to various …

A memory-related vulnerability detection approach based on vulnerability features

J Hu, J Chen, L Zhang, Y Liu, Q Bao… - Tsinghua Science …, 2020 - ieeexplore.ieee.org
Developing secure software systems is a major challenge in the software industry due to
errors or weaknesses that bring vulnerabilities to the software system. To address this …

Cross-domain attribute representation based on convolutional neural network

G Zhang, G Liang, F Su, F Qu, JY Wang - … 18, 2018, Proceedings, Part III 14, 2018 - Springer
In the problem of domain transfer learning, we learn a model for the prediction in a target
domain from the data of both some source domains and the target domain, where the target …

Evasion and countermeasures techniques to detect dynamic binary instrumentation frameworks

AS Filho, RJ Rodríguez, EL Feitosa - Digital Threats: Research and …, 2022 - dl.acm.org
Dynamic Binary Instrumentation (DBI) is a dynamic analysis technique that allows arbitrary
code to be executed when a program is running. DBI frameworks have started to be used to …

Racing on the Negative Force: Efficient Vulnerability {Root-Cause} Analysis through Reinforcement Learning on Counterexamples

D Xu, D Tang, Y Chen, XF Wang, K Chen… - 33rd USENIX Security …, 2024 - usenix.org
Root-Cause Analysis (RCA) is crucial for discovering security vulnerabilities from fuzzing
outcomes. Automating this process through triaging the crashes observed during the fuzzing …

Dress: Dynamic resource-reservation scheme for congested data-intensive computing platforms

Y Mao, V Green, J Wang, H Xiong… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
In the past few years, we have envisioned an increasing number of businesses start driving
by big data analytics, such as Amazon recommendations and Google Advertisements. At the …