It's all about sanitization
This blog post provides a brief description of static and dynamic taint analysis or taint checking.
Deep learning for vulnerability discovery
Here we describe the first systematic framework for using deep learning to detect...
The Anomaly Serial Killer Doll
Hunting missing checks with anomaly detection
Here we describe the system Chucky, which applies machine learning and natural language...
Exploiting Code Graphs
Mining graph representations for vulnerabilities
In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...
Machine-Learning to Hack
Machine learning for vulnerability discovery
This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...