A survey of human-in-the-loop for machine learning
Abstract Machine learning has become the state-of-the-art technique for many tasks
including computer vision, natural language processing, speech processing tasks, etc …
including computer vision, natural language processing, speech processing tasks, etc …
Ijon: Exploring deep state spaces via fuzzing
Although current fuzz testing (fuzzing) methods are highly effective, there are still many
situations such as complex state machines where fully automated approaches fail. State-of …
situations such as complex state machines where fully automated approaches fail. State-of …
Hackers vs. testers: A comparison of software vulnerability discovery processes
Identifying security vulnerabilities in software is a critical task that requires significant human
effort. Currently, vulnerability discovery is often the responsibility of software testers before …
effort. Currently, vulnerability discovery is often the responsibility of software testers before …
Continuous security testing: A case study on integrating dynamic security testing tools in ci/cd pipelines
T Rangnau, R Buijtenen, F Fransen… - 2020 IEEE 24th …, 2020 - ieeexplore.ieee.org
Continuous Integration (CI) and Continuous Delivery (CD) have become a well-known
practice in DevOps to ensure fast delivery of new features. This is achieved by automatically …
practice in DevOps to ensure fast delivery of new features. This is achieved by automatically …
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices
M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
An observational investigation of reverse {Engineers'} processes
Reverse engineering is a complex process essential to software-security tasks such as
vulnerability discovery and malware analysis. Significant research and engineering effort …
vulnerability discovery and malware analysis. Significant research and engineering effort …
Understanding security mistakes developers make: Qualitative analysis from build it, break it, fix it
Secure software development is a challenging task requiring consideration of many possible
threats and mitigations. This paper investigates how and why programmers, despite a …
threats and mitigations. This paper investigates how and why programmers, despite a …
[PDF][PDF] len or index or count, anything but v1”: Predicting variable names in decompilation output with transfer learning
Binary reverse engineering is an arduous and tedious task performed by skilled and
expensive human analysts. Information about the source code is irrevocably lost in the …
expensive human analysts. Information about the source code is irrevocably lost in the …
Bug synthesis: Challenging bug-finding tools with deep faults
In spite of decades of research in bug detection tools, there is a surprising dearth of ground-
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …
truth corpora that can be used to evaluate the efficacy of such tools. Recently, systems such …
Threat intelligence computing
Cyber threat hunting is the process of proactively and iteratively formulating and validating
threat hypotheses based on security-relevant observations and domain knowledge. To …
threat hypotheses based on security-relevant observations and domain knowledge. To …