Large Language Models (LLMs) have shown promise in automated program
rea...
Determining whether multiple instructions can access the same memory loc...
Directed greybox fuzzing is a popular technique for targeted software te...
Bound propagation methods, when combined with branch and bound, are amon...
Seed scheduling, the order in which seeds are selected, can greatly affe...
Trigger set-based watermarking schemes have gained emerging attention as...
Recent works have proposed methods to train classifiers with local robus...
Recent works in neural network verification show that cheap incomplete
v...
Detecting semantically similar functions – a crucial analysis capability...
Formal verification of neural networks (NNs) is a challenging and import...
Accurate and robust disassembly of stripped binaries is challenging. The...
We initiate the study of fair classifiers that are robust to perturbatio...
Current neural-network-based classifiers are susceptible to adversarial
...
Fuzzing is a widely used technique for detecting software bugs and
vulne...
Verifying real-world programs often requires inferring loop invariants w...
In many cases, verifying real-world programs requires inferring loop
inv...
Recent research has proposed the lottery ticket hypothesis, suggesting t...
In safety-critical but computationally resource-constrained applications...
A set of about 80 researchers, practitioners, and federal agency program...
Cyberphysical systems (CPS) are ubiquitous in our personal and professio...
Tree ensemble models including random forests and gradient boosted decis...
Program verification offers a framework for ensuring program correctness...
Dataflow tracking with Dynamic Taint Analysis (DTA) is an important meth...
Dynamic taint analysis (DTA) is widely used by various applications to t...
Deep neural networks have achieved impressive performance in many
applic...
Recent breakthroughs in defenses against adversarial examples, like
adve...
Although state-of-the-art PDF malware classifiers can be trained with al...
Making neural networks robust against adversarial inputs has resulted in...
There is an arms race to defend neural networks against adversarial exam...
Neural networks are increasingly deployed in real-world safety-critical
...
Fuzzing has become the de facto standard technique for finding software
...
Due to the increasing deployment of Deep Neural Networks (DNNs) in real-...
Adversarial examples in machine learning has been a topic of intense res...
Due to the increasing usage of machine learning (ML) techniques in secur...
Modern applications and Operating Systems vary greatly with respect to h...
Recent advances in Deep Neural Networks (DNNs) have led to the developme...