Cargando…
Malicious source code detection using a translation model
Modern software development often relies on open-source code sharing. Open-source code reuse, however, allows hackers to access wide developer communities, thereby potentially affecting many products. An increasing number of such “supply chain attacks” have occurred in recent years, taking advantage...
Autores principales: | Tsfaty, Chen, Fire, Michael |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Elsevier
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10382987/ https://www.ncbi.nlm.nih.gov/pubmed/37521045 http://dx.doi.org/10.1016/j.patter.2023.100773 |
Ejemplares similares
-
Malware: fighting malicious code
por: Skoudis, Ed, et al.
Publicado: (2004) -
Malicious attack propagation and source identification
por: Jiang, Jiaojiao, et al.
Publicado: (2018) -
JACLNet:Application of adaptive code length network in JavaScript malicious code detection
por: Zhang, Zhining, et al.
Publicado: (2022) -
Malicious mobile code: virus protection for Windows
por: Grimes, Roger A
Publicado: (2001) -
Malware Forensics: Investigating and Analyzing Malicious Code
por: Aquilina, James M, et al.
Publicado: (2008)