Jan. 12, 2023, 2:10 a.m. | Tanujay Saha, Tamjid Al-Rahat, Najwa Aaraj, Yuan Tian, Niraj K. Jha

cs.CR updates on arXiv.org arxiv.org

Machine learning (ML)-based methods have recently become attractive for
detecting security vulnerability exploits. Unfortunately, state-of-the-art ML
models like long short-term memories (LSTMs) and transformers incur significant
computation overheads. This overhead makes it infeasible to deploy them in
real-time environments. We propose a novel ML-based exploit detection model,
ML-FEED, that enables highly efficient inference without sacrificing
performance. We develop a novel automated technique to extract vulnerability
patterns from the Common Weakness Enumeration (CWE) and Common Vulnerabilities
and Exposures (CVE) databases. This …

art automated computation detection environments exploit exploits extract framework machine machine learning ml models novel patterns performance security security vulnerability state transformers version vulnerability

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Program Associate, Cyber Risk

@ Kroll | Toronto, ONT, Canada

Cybersecurity Operations Engineer 2

@ Humana | Remote US

Vice President - Lead Security Engineer (SECS04)

@ JPMorgan Chase & Co. | Columbus, OH, United States

Security Specialist

@ BGIS | Markham, ON, Canada