Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy 2016
DOI: 10.1145/2857705.2857720
|View full text |Cite
|
Sign up to set email alerts
|

Toward Large-Scale Vulnerability Discovery using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
69
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 180 publications
(76 citation statements)
references
References 20 publications
0
69
0
Order By: Relevance
“…In the third category, patterns are generated semi-automatically from type-agnostic vulnerabilities (i.e., no need to pre-classify them into different types). These methods use machine learning techniques, which rely on human experts for defining features to characterize vulnerabilities [19], [37], [38], [49], [59], [60]. Moreover, these methods cannot pin down the precise locations of vulnerabilities because programs are represented in coarse-grained granularity (e.g., program [19], package [37], component [38], [46], file [35], [49], and function [59], [60]).…”
Section: A Prior Work In Vulnerability Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the third category, patterns are generated semi-automatically from type-agnostic vulnerabilities (i.e., no need to pre-classify them into different types). These methods use machine learning techniques, which rely on human experts for defining features to characterize vulnerabilities [19], [37], [38], [49], [59], [60]. Moreover, these methods cannot pin down the precise locations of vulnerabilities because programs are represented in coarse-grained granularity (e.g., program [19], package [37], component [38], [46], file [35], [49], and function [59], [60]).…”
Section: A Prior Work In Vulnerability Detectionmentioning
confidence: 99%
“…An alternate approach is to automatically detect vulnerabilities in software programs, or simply programs for short. There have been many static vulnerability detection systems and studies for this purpose, ranging from open source tools [6], [11], [52], to commercial tools [2], [3], [7], to academic research projects [19], [28], [32], [37], [38], [49], [59], [60]. However, existing solutions for detecting vulnerabilities have two major drawbacks: imposing intense manual labor and incurring high false negative rates, which are elaborated below.…”
Section: Introductionmentioning
confidence: 99%
“…-Para2Vec: The paragraph-to-vector distributional similarity model proposed in [8] which allows us to embed paragraphs into a vector space which are further classified using a neural network. -VDiscover: An approach proposed in [4] that utilizes lightweight static features to "approximate" a code structure to seek similarities between program slices. -VulDeePecker: An approach proposed in [15] for source code vulnerability detection.…”
Section: Baselinesmentioning
confidence: 99%
“…The ability to detect the presence or absence of vulnerabilities in binary code, without getting access to source code, is therefore of major importance in the context of computer security. Some work has been proposed to detect vulnerabilities at the binary code level when source code is not available, notably work based on fuzzing, symbolic execution [1], or techniques using handcrafted features extracted from dynamic analysis [4]. Recently, the work of [10] has pioneered learning automatic features for binary software vulnerability detection.…”
Section: Introductionmentioning
confidence: 99%
“…The need for datasets and their generation are recurrent topics related to several research fields. Thus, there are published works in research areas as varied as radio signal processing [29], vehicular technology [30,31], vehicle-to-vehicle and vehicle-to-infrastructure wireless communication [32], computer vision [33] and pattern recognition [34], cyber threat intelligence [35], host intrusion detection [36], network intrusion detection system [37,38], smart grids [39], and software vulnerabilities [40][41][42][43][44][45], among many others.…”
Section: Introductionmentioning
confidence: 99%