Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the applicatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Proceedings (International Symposium on Digital Forensic and Security. Online) S. 1 - 6
Hauptverfasser: McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam
Format: Tagungsbericht
Sprache:Englisch
Veröffentlicht: IEEE 24.04.2025
Schlagworte:
ISSN:2768-1831
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!