The research objectives are toidentify weaknesses in binary program functions and combine deep learningtheories to address these weaknesses. The analysis section provides definitionsof binary programs, same-origin vulnerabilities, and software vulnerabilities.
The presenter highlights that in2022, around 17,000 vulnerabilities were recorded in the Common Vulnerabilityand Exposures (CVE) database. They emphasize the significance of this researchin dealing with the increasing threat of software vulnerabilities. The aim isto detect and evaluate vulnerabilities in binary files to improve systematicdetection and increase accuracy and reliability.
The presentation concludes with theresearch content, key technologies, solutions, and the experimental system.
Weakness-Identification-of-Binary-Program-Function-of-Pseudo-code-by-Incorporating-Structure-and-Sequence-Information-with-Attention-Residual-Connections-韩小初原创文章,作者:bfs,如若转载,请注明出处:https://www.isclab.org.cn/2023/07/04/weakness-identification-of-binary-program-function-of-pseudo-code-by-incorporating-structure-and-sequence-information-with-attention-residual-connections/