MLSEC 11 Flashcards
Vulnerabilities in software
a root cause for security breaches
Intelligent Vulnerability Discovery
Pattern-based vulnerability discovery
Learning from (source) code
Abstract Syntax Tree (AST)
Represents the “abstract” syntactic structure of source code
Control Flow Graph (CFG)
Represents the execution order of statements of a function
Data Dependence Graph (DDG)
Represents data dependencies between statements of a function
Control Dependence Graph (CDG)
Represents control dependencies between
statements of a function
Pattern-based Vulnerability Discovery
Describe vulnerabilities as sub-graphs of the code property graph
Code Property Graph
Joint representation of AST, CFG, DDG, CDG
Making Code Accessible for Learning
Object selection
Substructure enumeration
Mapping objects to vectors
Dimension Reduction
Seek a feature space of lower dimensionality
Why dimension reduction?
Improves computational performance of algorithms
minimize overfitting and reduce noise
Visualization of high-dimensional data