Development

Posts on concepts and methods related to software development and security that may involve areas such as AI, machine learning and mathematics.

Photo by Takahiro Sakamoto on Unsplash

Jason Chavarría


Five best practices for coding with the help of gen AI

Generative AI tools are an ally for developers to write code efficiently. We share five best practices for developing software securely while using those tools.

Photo by Ralston Smith on Unsplash

Felipe Ruiz


A simple approach to try out in cybersecurity training

We present a short review of a study in which the authors suggest an approach to introduce and encourage software developers to use secure coding practices.

Photo by Ga on Unsplash

Felipe Ruiz


And round it off with our Secure Code Review

Check out some best practices for secure coding your developers can start applying and how our Secure Code Review can complement them.

Photo by Fern M. Lomibao on Unsplash

Rafael Ballestas


With symbolic execution

Here's a reflection on the need to represent code before actually feeding it into neural network based encoders, such as code2vec, word2vec, and code2seq.

Book in two languages

Rafael Ballestas


From code to words

Here we talk about Code2seq, which differs in adapting neural machine translation techniques to the task of mapping a snippet of code to a sequence of words.

Target and darts

Rafael Ballestas


Vector representations of code

Here is a tutorial on the usage of code2vec to predict method names, determine the accuracy of the model, and exporting the corresponding vector embeddings.

Arrows vector field

Rafael Ballestas


Vector representations of code

Here we discuss code2vec relation with word2vec and autoencoders to grasp better how feasible it is to represent code as vectors, which is our main interest.

Photo by Possessed Photography on Unsplash

Rafael Ballestas


Distributed representations of natural language

This post is an overview of word2vec, a method for obtaining vectors that represent natural language in a way that is suitable for machine learning algorithms.

Photo by camilo jimenez on Unsplash

Rafael Ballestas


Prioritize code auditing via ML

This post is a high-level review of our previous discussion concerning machine learning techniques applied to vulnerability discovery and exploitation.

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.