We take the first step to address the task of automatically generating shellcodes, i.e., small pieces of code used as a payload in the exploitation of a software vulnerability, starting from natural language comments. We assemble and release a novel dataset (Shellcode_IA32), consisting of challenging but common assembly instructions with their natural language descriptions. We experiment with standard methods in neural machine translation (NMT) to establish baseline performance levels on this task
Polymorphic malcode remains a troubling threat. The ability formal code to automatically transform i...
Pre-trained programming language (PL) models (such as CodeT5, CodeBERT, GraphCodeBERT, etc.,) have t...
peer reviewedNatural language processing techniques, in particular n-gram models, have been applied ...
We take the first step to address the task of automatically generating shellcodes, i.e., small piece...
Writing software exploits is an important practice for offensive security analysts to investigate an...
Writing exploits for security assessment is a challenging task. The writer needs to master programmi...
In this article, we present a Shell Language Preprocessing (SLP) library, which implements tokenizat...
The generation of printable shellcode is an important computer security research area. The original ...
Neural Machine Translation (NMT) has reached a level of maturity to be recognized as the premier met...
Open software repositories make large amounts of source code publicly available. Potentially, this s...
Translating natural language into source code or programs is an important problem in natural languag...
Abstract—Although several research teams have focused on bi-nary code injection, it is still an unso...
ASE 2015 : 2015 30th IEEE/ACM International Conference on Automated Software Engineering, 9-13 Nov. ...
Source code evolves – inevitably – to remain useful, secure, correct, readable, and efficient. Devel...
Code generation maps a program description to executable source code in a programming language. Exis...
Polymorphic malcode remains a troubling threat. The ability formal code to automatically transform i...
Pre-trained programming language (PL) models (such as CodeT5, CodeBERT, GraphCodeBERT, etc.,) have t...
peer reviewedNatural language processing techniques, in particular n-gram models, have been applied ...
We take the first step to address the task of automatically generating shellcodes, i.e., small piece...
Writing software exploits is an important practice for offensive security analysts to investigate an...
Writing exploits for security assessment is a challenging task. The writer needs to master programmi...
In this article, we present a Shell Language Preprocessing (SLP) library, which implements tokenizat...
The generation of printable shellcode is an important computer security research area. The original ...
Neural Machine Translation (NMT) has reached a level of maturity to be recognized as the premier met...
Open software repositories make large amounts of source code publicly available. Potentially, this s...
Translating natural language into source code or programs is an important problem in natural languag...
Abstract—Although several research teams have focused on bi-nary code injection, it is still an unso...
ASE 2015 : 2015 30th IEEE/ACM International Conference on Automated Software Engineering, 9-13 Nov. ...
Source code evolves – inevitably – to remain useful, secure, correct, readable, and efficient. Devel...
Code generation maps a program description to executable source code in a programming language. Exis...
Polymorphic malcode remains a troubling threat. The ability formal code to automatically transform i...
Pre-trained programming language (PL) models (such as CodeT5, CodeBERT, GraphCodeBERT, etc.,) have t...
peer reviewedNatural language processing techniques, in particular n-gram models, have been applied ...