{CADE}: Detecting and explaining concept drift samples for security applications

L Yang, W Guo, Q Hao, A Ciptadi… - 30th USENIX Security …, 2021 - usenix.org
Concept drift poses a critical challenge to deploy machine learning models to solve practical
security problems. Due to the dynamic behavior changes of attackers (and/or the benign …

{AIRTAG}: Towards automated attack investigation by unsupervised learning with log texts

H Ding, J Zhai, Y Nan, S Ma - 32nd USENIX Security Symposium …, 2023 - usenix.org
The success of deep learning (DL) techniques has led to their adoption in many fields,
including attack investigation, which aims to recover the whole attack story from logged …

Xda: Accurate, robust disassembly with transfer learning

K Pei, J Guan, D Williams-King, J Yang… - arxiv preprint arxiv …, 2020 - arxiv.org
Accurate and robust disassembly of stripped binaries is challenging. The root of the difficulty
is that high-level structures, such as instruction and function boundaries, are absent in …

CLAP: Learning transferable binary code representations with natural language supervision

H Wang, Z Gao, C Zhang, Z Sha, M Sun… - Proceedings of the 33rd …, 2024 - dl.acm.org
Binary code representation learning has shown significant performance in binary analysis
tasks. But existing solutions often have poor transferability, particularly in few-shot and zero …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

{AURORA}: Statistical crash analysis for automated root cause explanation

T Blazytko, M Schlögel, C Aschermann… - 29th USENIX Security …, 2020 - usenix.org
Given the huge success of automated software testing techniques, a large amount of
crashes is found in practice. Identifying the root cause of a crash is a time-intensive …

{APICraft}: Fuzz driver generation for closed-source {SDK} libraries

C Zhang, X Lin, Y Li, Y Xue, J **e, H Chen… - 30th USENIX Security …, 2021 - usenix.org
Fuzz drivers are needed for fuzzing libraries. A fuzz driver is a program which can execute
library functions by feeding them with inputs provided by the fuzzer. In practice, fuzz drivers …

{DeepDi}: Learning a relational graph convolutional network model on instructions for fast and accurate disassembly

S Yu, Y Qu, X Hu, H Yin - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Disassembly is the cornerstone of many binary analysis tasks. Traditional disassembly
approaches (eg, linear and recursive) are not accurate enough, while more sophisticated …

Using deep learning to solve computer security challenges: a survey

YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang… - Cybersecurity, 2020 - Springer
Although using machine learning techniques to solve computer security challenges is not a
new idea, the rapidly emerging Deep Learning technology has recently triggered a …

Can a deep learning model for one architecture be used for others?{Retargeted-Architecture} binary code analysis

J Wang, M Sharp, C Wu, Q Zeng, L Luo - 32nd USENIX Security …, 2023 - usenix.org
NLP-inspired deep learning for binary code analysis demonstrates notable performance.
Considering the diverse Instruction Set Architectures (ISAs) on the market, it is important to …