Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
EVIL: Exploiting Software via Natural Language
by
Natella, Roberto
, Shaikh, Samira
, Al-Hossami, Erfan
, Orbinato, Vittorio
, Liguori, Pietro
, Cukic, Bojan
, Cotroneo, Domenico
in
Feasibility studies
/ Machine translation
/ Natural language
/ Programming languages
2021
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
EVIL: Exploiting Software via Natural Language
by
Natella, Roberto
, Shaikh, Samira
, Al-Hossami, Erfan
, Orbinato, Vittorio
, Liguori, Pietro
, Cukic, Bojan
, Cotroneo, Domenico
in
Feasibility studies
/ Machine translation
/ Natural language
/ Programming languages
2021
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Paper
EVIL: Exploiting Software via Natural Language
2021
Request Book From Autostore
and Choose the Collection Method
Overview
Writing exploits for security assessment is a challenging task. The writer needs to master programming and obfuscation techniques to develop a successful exploit. To make the task easier, we propose an approach (EVIL) to automatically generate exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work. We present an extensive experimental study to evaluate the feasibility of EVIL, using both automatic and manual analysis, and both at generating individual statements and entire exploits. The generated code achieved high accuracy in terms of syntactic and semantic correctness.
Publisher
Cornell University Library, arXiv.org
This website uses cookies to ensure you get the best experience on our website.