Photo by Andres Urena on Unsplash. Credits:

Natural Code

Natural language processing for code security

In this blog post, we present the use of Natural Language Processing in bug finding and coding...

Nicolás Acosta, CISO at Corona

Innovation More Understandable

Nicolás Acosta, CISO of Corona, shared his perspective on topics like artificial intelligence,...

Photo by Aurélien Clément Ducret on Unsplash

Preventing Hacks at CERN

A chat with Andrés Gómez

For this post, we spoke with Andrés Gómez, a former Fluid Attacks' member, who is researching to...

Binary machine learning. Credits:

Binary Learning

Learning to exploit binaries

In this article, we describe a system named VDiscover, created from the ground up to learn...

Depiction of a deep neural network. Credits:

Deep Hacking

Deep learning for vulnerability discovery

Here we describe the first systematic framework for using deep learning to detect...

The actual serial killer doll

The Anomaly Serial Killer Doll

Hunting missing checks with anomaly detection

Here we describe the system Chucky, which applies machine learning and natural language...

Screen showing source code

Exploiting Code Graphs

Mining graph representations for vulnerabilities

In this post, we introduce Yamaguchi's concept of code property graphs, how to traverse them,...

Robot playing the piano

Crash Course in Machine Learning

A survey of machine learning algorithms

In this article, we give a high-level view of each of the most important ML algorithms that have...

Can machines learn to hack?

Machine-Learning to Hack

Machine learning for vulnerability discovery

This post is a bird's eye view of machine learning techniques applied to vulnerability discovery...

Copyright © 2020 Fluid Attacks, We hack your software. All rights reserved.

Service status - Terms of Use - Privacy Policy - Cookie Policy