no code implementations • 4 Oct 2022 • Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray
Notably, NeuDep also outperforms the current state-of-the-art on these tasks.
1 code implementation • 25 May 2020 • Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray
The compact embedding can be used to guide the mutation process effectively by focusing most of the mutations on the parts of the embedding where the gradient is high.
Software Engineering
no code implementations • 8 Sep 2019 • Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana
Dataflow tracking with Dynamic Taint Analysis (DTA) is an important method in systems security with many applications, including exploit analysis, guided fuzzing, and side-channel information leak detection.
Cryptography and Security
no code implementations • 8 Jul 2019 • Dongdong She, Yizheng Chen, Baishakhi Ray, Suman Jana
Dynamic taint analysis (DTA) is widely used by various applications to track information flow during runtime execution.
Cryptography and Security
1 code implementation • 6 Apr 2019 • Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana
A practically useful malware classifier must be robust against evasion attacks.
1 code implementation • 15 Jul 2018 • Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana
However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger software bugs.