The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

[HTML][HTML] Static analysis of information systems for IoT cyber security: A survey of machine learning approaches

I Kotenko, K Izrailov, M Buinevich - Sensors, 2022 - mdpi.com
Ensuring security for modern IoT systems requires the use of complex methods to analyze
their software. One of the most in-demand methods that has repeatedly been proven to be …

Unsolved problems in ml safety

D Hendrycks, N Carlini, J Schulman… - arxiv preprint arxiv …, 2021 - arxiv.org
Machine learning (ML) systems are rapidly increasing in size, are acquiring new
capabilities, and are increasingly deployed in high-stakes settings. As with other powerful …

Dos and don'ts of machine learning in computer security

D Arp, E Quiring, F Pendlebury, A Warnecke… - 31st USENIX Security …, 2022 - usenix.org
With the growing processing power of computing systems and the increasing availability of
massive datasets, machine learning algorithms have led to major breakthroughs in many …

Neural cleanse: Identifying and mitigating backdoor attacks in neural networks

B Wang, Y Yao, S Shan, H Li… - … IEEE symposium on …, 2019 - ieeexplore.ieee.org
Lack of transparency in deep neural networks (DNNs) make them susceptible to backdoor
attacks, where hidden associations or triggers override normal classification to produce …

Sysevr: A framework for using deep learning to detect software vulnerabilities

Z Li, D Zou, S Xu, H **, Y Zhu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The detection of software vulnerabilities (or vulnerabilities for short) is an important problem
that has yet to be tackled, as manifested by the many vulnerabilities reported on a daily …

Vuldeepecker: A deep learning-based system for vulnerability detection

Z Li, D Zou, S Xu, X Ou, H **, S Wang, Z Deng… - arxiv preprint arxiv …, 2018 - arxiv.org
The automatic detection of software vulnerabilities is an important research problem.
However, existing solutions to this problem rely on human experts to define features and …

Palmtree: Learning an assembly language model for instruction embedding

X Li, Y Qu, H Yin - Proceedings of the 2021 ACM SIGSAC conference on …, 2021 - dl.acm.org
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including
function boundary detection, binary code search, function prototype inference, value set …

Neural network-based graph embedding for cross-platform binary code similarity detection

X Xu, C Liu, Q Feng, H Yin, L Song… - Proceedings of the 2017 …, 2017 - dl.acm.org
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …

Learning to fuzz from symbolic execution with application to smart contracts

J He, M Balunović, N Ambroladze, P Tsankov… - Proceedings of the …, 2019 - dl.acm.org
Fuzzing and symbolic execution are two complementary techniques for discovering software
vulnerabilities. Fuzzing is fast and scalable, but can be ineffective when it fails to randomly …