[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Fuzzing: a survey for roadmap

X Zhu, S Wen, S Camtepe, Y **ang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Fuzz testing (fuzzing) has witnessed its prosperity in detecting security flaws recently. It
generates a large number of test cases and monitors the executions for defects. Fuzzing has …

Unsolved problems in ml safety

D Hendrycks, N Carlini, J Schulman… - arxiv preprint arxiv …, 2021 - arxiv.org
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …

Deep learning based vulnerability detection: Are we there yet?

S Chakraborty, R Krishna, Y Ding… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …

Llm4vuln: A unified evaluation framework for decoupling and enhancing llms' vulnerability reasoning

Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
Large language models (LLMs) have demonstrated significant potential in various tasks,
including vulnerability detection. However, current efforts in this area are preliminary, lacking …

Beacon: Directed grey-box fuzzing with provable path pruning

H Huang, Y Guo, Q Shi, P Yao, R Wu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Unlike coverage-based fuzzing that gives equal attention to every part of a code, directed
fuzzing aims to direct a fuzzer to a specific target in the code, eg, the code with potential …

{GREYONE}: Data flow sensitive fuzzing

S Gan, C Zhang, P Chen, B Zhao, X Qin, D Wu… - 29th USENIX security …, 2020 - usenix.org
Data flow analysis (eg, dynamic taint analysis) has proven to be useful for guiding fuzzers to
explore hard-to-reach code and find vulnerabilities. However, traditional taint analysis is …

{ParmeSan}: Sanitizer-guided greybox fuzzing

S Österlund, K Razavi, H Bos, C Giuffrida - 29th USENIX Security …, 2020 - usenix.org
One of the key questions when fuzzing is where to look for vulnerabilities. Coverage-guided
fuzzers indiscriminately optimize for covering as much code as possible given that bug …

The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

Restler: Stateful rest api fuzzing

V Atlidakis, P Godefroid… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
This paper introduces RESTler, the first stateful REST API fuzzer. RESTler analyzes the API
specification of a cloud service and generates sequences of requests that automatically test …