{CADE}: Detecting and explaining concept drift samples for security applications

L Yang, W Guo, Q Hao, A Ciptadi… - 30th USENIX Security …, 2021 - usenix.org
Concept drift poses a critical challenge to deploy machine learning models to solve practical
security problems. Due to the dynamic behavior changes of attackers (and/or the benign …

{AIRTAG}: Towards Automated Attack Investigation by Unsupervised Learning with Log Texts

H Ding, J Zhai, Y Nan, S Ma - 32nd USENIX Security Symposium …, 2023 - usenix.org
The success of deep learning (DL) techniques has led to their adoption in many fields,
including attack investigation, which aims to recover the whole attack story from logged …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Xda: Accurate, robust disassembly with transfer learning

K Pei, J Guan, D Williams-King, J Yang… - arXiv preprint arXiv …, 2020 - arxiv.org
Accurate and robust disassembly of stripped binaries is challenging. The root of the difficulty
is that high-level structures, such as instruction and function boundaries, are absent in …

Can a Deep Learning Model for One Architecture Be Used for Others?{Retargeted-Architecture} Binary Code Analysis

J Wang, M Sharp, C Wu, Q Zeng, L Luo - 32nd USENIX Security …, 2023 - usenix.org
NLP-inspired deep learning for binary code analysis demonstrates notable performance.
Considering the diverse Instruction Set Architectures (ISAs) on the market, it is important to …

{AURORA}: Statistical crash analysis for automated root cause explanation

T Blazytko, M Schlögel, C Aschermann… - 29th USENIX Security …, 2020 - usenix.org
Given the huge success of automated software testing techniques, a large amount of
crashes is found in practice. Identifying the root cause of a crash is a time-intensive …

{APICraft}: Fuzz driver generation for closed-source {SDK} libraries

C Zhang, X Lin, Y Li, Y Xue, J Xie, H Chen… - 30th USENIX Security …, 2021 - usenix.org
Fuzz drivers are needed for fuzzing libraries. A fuzz driver is a program which can execute
library functions by feeding them with inputs provided by the fuzzer. In practice, fuzz drivers …

{DeepDi}: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly

S Yu, Y Qu, X Hu, H Yin - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Disassembly is the cornerstone of many binary analysis tasks. Traditional disassembly
approaches (eg, linear and recursive) are not accurate enough, while more sophisticated …

Using deep learning to solve computer security challenges: a survey

YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang… - Cybersecurity, 2020 - Springer
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …

{AI} Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images

D Oygenblik, C Yagemann, J Zhang, A Mastali… - 33rd USENIX Security …, 2024 - usenix.org
Online learning is widely used in production to refine model parameters after initial
deployment. This opens several vectors for covertly launching attacks against deployed …