TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code
Ransomware and other malware inflict devastating financial and operational damage on organizations worldwide by exploiting deeply embedded, hard-to-detect vulnerabilities in their systems. Detecting these vulnerabilities in compiled code before malicious actors exploit them remains a critical challe...
Saved in:
| Main Authors: | Gary A. McCully, John D. Hastings, Shengjie Xu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10980253/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Identification of Arbitrary Length Shellcode for the Intel x64 Architecture as a NOP Sled
by: Austin Norby, et al.
Published: (2025-01-01) -
SSRC:source rate control algorithm for delay-sensitive flow in data center network
by: Yang YANG, et al.
Published: (2019-07-01) -
A Fine-Tuned BERT-Based Model for Individual Log Anomaly Detection in Operational Monitoring at Paranal Observatory
by: Andres H. Catalan, et al.
Published: (2025-01-01) -
New Insight on the Application of Binary Coded Chiliad (BCC) Encoding for Decimal Arithmetic
by: Morteza Dorrigiv
Published: (2021-06-01) -
RP-KGC: A Knowledge Graph Completion Model Integrating Rule-Based Knowledge for Pretraining and Inference
by: Wenying Guo, et al.
Published: (2025-02-01)