The Coming Era of AlphaHacking?

05/28/2018
by   Tiantian Ji, et al.
0

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, the topic of Autonomous Cyber Reasoning System (CRS) has recently attracted extensive attention from both industry and academia. Utilizing automated system to detect, exploit and patch software vulnerabilities seems so attractive because of its scalability and cost-efficiency compared with the human expert based solution. In this paper, we give an extensive survey of former representative works related to the underlying technologies of a CRS, including vulnerability detection, exploitation and patching. As an important supplement, we then review several pioneer studies that explore the potential of machine learning technologies in this field, and point out that the future development of Autonomous CRS is inseparable from machine learning.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2018

The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

With the success of the Cyber Grand Challenge (CGC) sponsored by DARPA, ...
research
04/23/2021

Literature review on vulnerability detection using NLP technology

Vulnerability detection has always been the most important task in the f...
research
08/07/2022

Cyber Pirates Ahoy! An Analysis of Cybersecurity Challenges in the Shipping Industry

Maritime shipping has become a trillion-dollar industry that now impacts...
research
08/09/2017

Rise of the HaCRS: Augmenting Autonomous Cyber Reasoning Systems with Human Assistance

As the size and complexity of software systems increase, the number and ...
research
05/09/2023

Enhancing Cyber-Resiliency of DER-based SmartGrid: A Survey

The rapid development of information and communications technology has e...
research
07/27/2022

Railway cyber-security in the era of interconnected systems: a survey

Technological advances in the telecommunications industry have brought s...
research
12/15/2018

A Survey of Privacy Infrastructures and Their Vulnerabilities

Over the last two decades, the scale and complexity of Anonymous network...

Please sign up or login with your details

Forgot password? Click here to reset