Photo by Andres Urena on Unsplash. Credits: https://unsplash.com/photos/k1osF_h2fzA

Natural Code

Natural language processing for code security


In this blog post, we present the use of Natural Language Processing in bug finding and coding...



Nicolás Acosta, CISO at Corona

Innovation More Understandable


Nicolás Acosta, CISO of Corona, shared his perspective on topics like artificial intelligence,...



Photo by Aurélien Clément Ducret on Unsplash

Preventing Hacks at CERN

A chat with Andrés Gómez


For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to...



Binary machine learning. Credits: https://unsplash.com/photos/h3sAF1cVURw

Binary Learning

Learning to exploit binaries


In this article, we describe a system named VDiscover, created from the ground up to learn...



Depiction of a deep neural network. Credits: https://unsplash.com/photos/R84Oy89aNKs

Deep Hacking

Deep learning for vulnerability discovery


Here we describe the first systematic framework for using deep learning to detect...



The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection


Here we describe the system Chucky, which applies machine learning and natural language...



Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities


In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...



Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms


In this article, we give a high-level view of each of the most important ML algorithms that have...



Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery


This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...




Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy