Authorship attribution methods, challenges, and future research directions: A comprehensive survey

X He, AH Lashkari, N Vombatkere, DP Sharma - Information, 2024 - mdpi.com
Over the past few decades, researchers have put their effort and paid significant attention to
the authorship attribution field, as it plays an important role in software forensics analysis …

Code authorship attribution: Methods and challenges

V Kalgutkar, R Kaur, H Gonzalez… - ACM Computing …, 2019 - dl.acm.org
Code authorship attribution is the process of identifying the author of a given code. With
increasing numbers of malware and advanced mutation techniques, the authors of malware …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Natural attack for pre-trained models of code

Z Yang, J Shi, J He, D Lo - … of the 44th International Conference on …, 2022 - dl.acm.org
Pre-trained models of code have achieved success in many important software engineering
tasks. However, these powerful models are vulnerable to adversarial attacks that slightly …

Sysevr: A framework for using deep learning to detect software vulnerabilities

Z Li, D Zou, S Xu, H **, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …

Robustness, security, privacy, explainability, efficiency, and usability of large language models for code

Z Yang, Z Sun, TZ Yue, P Devanbu, D Lo - arxiv preprint arxiv:2403.07506, 2024 - arxiv.org
Large language models for code (LLM4Code), which demonstrate strong performance (eg,
high accuracy) in processing source code, have significantly transformed software …

Authorship attribution for neural text generation

A Uchendu, T Le, K Shu, D Lee - Proceedings of the 2020 …, 2020 - aclanthology.org
In recent years, the task of generating realistic short and long texts have made tremendous
advancements. In particular, several recently proposed neural network-based language …

Misleading authorship attribution of source code using adversarial learning

E Quiring, A Maier, K Rieck - 28th USENIX Security Symposium …, 2019 - usenix.org
In this paper, we present a novel attack against authorship attribution of source code. We
exploit that recent attribution methods rest on machine learning and thus can be deceived by …

Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls

G Shenderovitz, N Nissim - Computers & Security, 2024 - Elsevier
Abstract Advanced Persistent Threats (APTs) are highly sophisticated cyberattacks that are
aimed at achieving strategic goals and are usually backed by a well-funded entity. In this …

Automatic source code summarization with extended tree-lstm

Y Shido, Y Kobayashi, A Yamamoto… - … Joint Conference on …, 2019 - ieeexplore.ieee.org
Neural machine translation models are used to automatically generate a document from
given source code since this can be regarded as a machine translation task. Source code …