Weakness Identification of Binary Program Function of Pseudo-code by Incorporating Structure and Sequence Information with Attention-Residual Connections
The research objectives are to identify weaknesses in binary program functions and combine deep learning theories to address these weaknesses. The analysis section provides definitions of binary programs, same-origin vulnerabilities, and software vulnerabilities.
The presenter highlights that in 2022, around 17,000 vulnerabilities were recorded in the Common Vulnerability and Exposures (CVE) database. They emphasize the significance of this research in dealing with the increasing threat of software vulnerabilities. The aim is to detect and evaluate vulnerabilities in binary files to improve systematic detection and increase accuracy and reliability.
The presentation concludes with the research content, key technologies, solutions, and the experimental system.PDF Embedder requires a url attribute Weakness-Identification-of-Binary-Program-Function-of-Pseudo-code-by-Incorporating-Structure-and-Sequence-Information-with-Attention-Residual-Connections-韩小初