Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa

We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...

Rubber duckies

Understanding Program Semantics

With symbolic execution

A reflection on the need to represent code before actually feeding it into neural network based...

Book in two languages

Can Code Be translated?

From code to words

Here we talk about Code2seq, which differs in adapting neural machine translation techniques to...

Target and darts

Further down code2vec

Vector representations of code

A tutorial on the usage of code2vec for the purposes of predicting method names, determining the...

Arrows vector field

Embedding code into vectors

Vector representations of code

Code2vec is a neural network based method to predict function names from the abstract syntax...

Photo by Franck V. on Unsplash:

The Vectors of Language

Distributed representations of natural language

This blog is an overview of word2vec, a method to obtain vectors to represent natural language...

Photo by camilo jimenez on Unsplash:

Triage for Hackers

Prioritize code auditing via ML

This blog is a high-level review of our previous discussion concerning machine learning...

Photo by Rishi Deep on Unsplash:

Vulnerability classifiers

A pipeline to classify vulnerable code

A simple attempt at defining a vulnerability classifier using categorical encoding and a basic...

Computer showing a graph

Digression to Regression

Simple linear regression in scikit

In this blog, we begin to tackle the question of why vectors are the most appropriate...

Data Has A Better Idea. Photo by Stefan Steinbauer on Unsplash:

Vulnerabilities in Deep Learning

Deep Learning for vulnerability disclosure

This blog discusses an article from Boston University presenting new applications of Artificial...

Photo by KP Bodenstein on Unsplash:

Fool the Machine

Trick neural network classifiers

While neural networks are great at artificial intelligence tasks, they still have flaws. In this...

Git. Photo by Yancy Min on Unsplash:

Big Code

Learning from open source

Here we'll see how DeepCode works. It has a lot of potential for identifying bugs in your code...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy