Skip to main content

Showing 1–2 of 2 results for author: Fortier, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.17513  [pdf, other

    cs.CR cs.CL cs.LG cs.SE

    Comparing Unidirectional, Bidirectional, and Word2vec Models for Discovering Vulnerabilities in Compiled Lifted Code

    Authors: Gary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier

    Abstract: Ransomware and other forms of malware cause significant financial and operational damage to organizations by exploiting long-standing and often difficult-to-detect software vulnerabilities. To detect vulnerabilities such as buffer overflows in compiled code, this research investigates the application of unidirectional transformer-based embeddings, specifically GPT-2. Using a dataset of LLVM functi… ▽ More

    Submitted 18 February, 2025; v1 submitted 25 September, 2024; originally announced September 2024.

    Comments: 6 pages, 2 figures

    ACM Class: D.4.6; I.2.6; I.5.1

    Journal ref: 2025 IEEE 13th International Symposium on Digital Forensics and Security (ISDFS)

  2. arXiv:2405.20611  [pdf, other

    cs.CR cs.CL cs.LG cs.SE

    Bi-Directional Transformers vs. word2vec: Discovering Vulnerabilities in Lifted Compiled Code

    Authors: Gary A. McCully, John D. Hastings, Shengjie Xu, Adam Fortier

    Abstract: Detecting vulnerabilities within compiled binaries is challenging due to lost high-level code structures and other factors such as architectural dependencies, compilers, and optimization options. To address these obstacles, this research explores vulnerability detection using natural language processing (NLP) embedding techniques with word2vec, BERT, and RoBERTa to learn semantics from intermediat… ▽ More

    Submitted 27 September, 2024; v1 submitted 30 May, 2024; originally announced May 2024.

    Comments: Updated with improvements

    ACM Class: D.4.6; I.2.6; I.5.1

    Journal ref: 2024 IEEE Cyber Awareness and Research Symposium (CARS), Grand Forks, ND, USA, 2024, pp. 1-8