Главная
Study mode:
on
1
Intro
2
Dynamic taint analysis (DTA)
3
Limitations of traditional rule-based DTA
4
A motivating example: taint propagation
5
A motivating example: Neural program embedding
6
Neutaint: a new way to track taint information
7
Data collection
8
Influence Analysis by Gradient Computation
9
Evaluation
10
Hot byte accuracy, runtime
11
Case study: overtaint
12
Case study: runtime overhead
13
Exploit analysis
14
Fuzzing
15
Performance on different ML models
16
Effect of training data on information loss
Description:
Explore an innovative approach to dynamic taint analysis using neural networks in this IEEE conference talk. Delve into the limitations of traditional rule-based DTA and discover how Neutaint offers a more efficient method for tracking taint information. Learn about data collection techniques, influence analysis through gradient computation, and the evaluation process. Examine case studies on overtaint and runtime overhead, and understand the application of this technology in exploit analysis and fuzzing. Investigate the performance of different ML models and the impact of training data on information loss. Gain insights into this cutting-edge technique that promises to revolutionize dynamic taint analysis in the field of computer security.

Neutaint- Efficient Dynamic Taint Analysis with Neural Networks

IEEE
Add to list
0:00 / 0:00