TEDVIL: Leveraging Transformer-Based Embeddings for Vulnerability Detection in Lifted Code

Ransomware and other malware inflict devastating financial and operational damage on organizations worldwide by exploiting deeply embedded, hard-to-detect vulnerabilities in their systems. Detecting these vulnerabilities in compiled code before malicious actors exploit them remains a critical challe...

Full description

Saved in:
Bibliographic Details
Main Authors: Gary A. McCully, John D. Hastings, Shengjie Xu
Format: Article
Language:English
Published: IEEE 2025-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10980253/
Tags: Add Tag
No Tags, Be the first to tag this record!