Photo by Liam Tucker on Unsplash

A Perspective in Cybersecurity

A chat with Daniel Correa


We had the pleasure of chatting with Daniel Correa, a Security Expert who shared his views on...



Rubber duckies

Understanding Program Semantics

With symbolic execution


A reflection on the need to represent code before actually feeding it into neural network based...



Book in two languages

Can Code Be translated?

From code to words


Here we talk about Code2seq, which differs in adapting neural machine translation techniques to...



Target and darts

Further down code2vec

Vector representations of code


A tutorial on the usage of code2vec for the purposes of predicting method names, determining the...



Arrows vector field

Embedding code into vectors

Vector representations of code


Code2vec is a neural network based method to predict function names from the abstract syntax...



Photo by Franck V. on Unsplash: https://unsplash.com/photos/_E1PQXKUkMw

The Vectors of Language

Distributed representations of natural language


This blog is an overview of word2vec, a method to obtain vectors to represent natural language...



Photo by camilo jimenez on Unsplash: https://unsplash.com/photos/vGu08RYjO-s

Triage for Hackers

Prioritize code auditing via ML


This blog is a high-level review of our previous discussion concerning machine learning...



Photo by Rishi Deep on Unsplash: https://unsplash.com/photos/WiCvC9u7OpE

Vulnerability classifiers

A pipeline to classify vulnerable code


A simple attempt at defining a vulnerability classifier using categorical encoding and a basic...



Computer showing a graph

Digression to Regression

Simple linear regression in scikit


In this blog, we begin to tackle the question of why vectors are the most appropriate...



Data Has A Better Idea. Photo by Stefan Steinbauer on Unsplash: https://unsplash.com/photos/1K6IQsQbizI

Vulnerabilities in Deep Learning

Deep Learning for vulnerability disclosure


This blog discusses an article from Boston University presenting new applications of Artificial...



Photo by KP Bodenstein on Unsplash: https://unsplash.com/photos/ElQI4kGSbiw

Fool the Machine

Trick neural network classifiers


While neural networks are great at artificial intelligence tasks, they still have flaws. In this...



Git. Photo by Yancy Min on Unsplash: https://unsplash.com/photos/842ofHC6MaI/

Big Code

Learning from open source


Here we'll see how DeepCode works. It has a lot of potential for identifying bugs in your code...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy