Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the applicatio...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings (International Symposium on Digital Forensic and Security. Online) pp. 1 - 6
Main Authors: McCully, Gary A., Hastings, John D., Xu, Shengjie, Fortier, Adam
Format: Conference Proceeding
Language:English
Published: IEEE 24.04.2025
Subjects:
ISSN:2768-1831
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first