MLSEC 11 Flashcards

1
Q

Vulnerabilities in software

A

a root cause for security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intelligent Vulnerability Discovery

A

Pattern-based vulnerability discovery

Learning from (source) code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Abstract Syntax Tree (AST)

A

Represents the “abstract” syntactic structure of source code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Control Flow Graph (CFG)

A

Represents the execution order of statements of a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data Dependence Graph (DDG)

A

Represents data dependencies between statements of a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Control Dependence Graph (CDG)

A

Represents control dependencies between
statements of a function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pattern-based Vulnerability Discovery

A

Describe vulnerabilities as sub-graphs of the code property graph

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Code Property Graph

A

Joint representation of AST, CFG, DDG, CDG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Making Code Accessible for Learning

A

Object selection

Substructure enumeration

Mapping objects to vectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Dimension Reduction

A

Seek a feature space of lower dimensionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why dimension reduction?

A

Improves computational performance of algorithms

minimize overfitting and reduce noise

Visualization of high-dimensional data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly