Pre-trained programming language (PL) models (such as CodeT5, CodeBERT, GraphCodeBERT, etc.,) have the potential to automate software engineering tasks involving code understanding and code generation. However, these models operate in the natural channel of code, i.e., primarily concerned with the human understanding of code. They are not robust to changes in the input and thus, are potentially susceptible to adversarial attacks in the natural channel. We propose, Code Attack, a simple yet effective black-box attack model that uses code structure to generate effective, efficient, and imperceptible adversarial code samples and demonstrates the vulnerabilities of the state-of-the-art PL models to code-specific adversarial attacks. We evaluate...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Automated processing, analysis, and generation of source code are among the key activities in softwa...
Machine learning and deep learning in particular has been recently used to successfully address many...
Recent studies have shown that natural language processing (NLP) models are vulnerable to adversaria...
The probing of software by security testers to detect possible vulnerabilities is of primary importa...
The monumental achievements of deep learning (DL) systems seem to guarantee the absolute superiority...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
Code models, such as CodeBERT and CodeT5, offer general-purpose representations of code and play a v...
In recent years, machine learning (ML) models have been extensively used in software analytics, such...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
We study an important and challenging task of attacking natural language processing models in a hard...
Dynamically-typed languages have improved programming experience in software development, leading to...
Modern machine learning models can be difficult to probe and understand after they have been trained...
Adversarial Machine learning is a field of research lying at the intersection of Machine Learning an...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Automated processing, analysis, and generation of source code are among the key activities in softwa...
Machine learning and deep learning in particular has been recently used to successfully address many...
Recent studies have shown that natural language processing (NLP) models are vulnerable to adversaria...
The probing of software by security testers to detect possible vulnerabilities is of primary importa...
The monumental achievements of deep learning (DL) systems seem to guarantee the absolute superiority...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
Code models, such as CodeBERT and CodeT5, offer general-purpose representations of code and play a v...
In recent years, machine learning (ML) models have been extensively used in software analytics, such...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
We study an important and challenging task of attacking natural language processing models in a hard...
Dynamically-typed languages have improved programming experience in software development, leading to...
Modern machine learning models can be difficult to probe and understand after they have been trained...
Adversarial Machine learning is a field of research lying at the intersection of Machine Learning an...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
In this extended abstract we survey the most recent developments in code obfuscation and protection ...
Automated processing, analysis, and generation of source code are among the key activities in softwa...