For this #ThrowbackThursday, we will look at #ACSAC2024's Application Security session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6
First up in the session was Yadav & Wilson's "R+R: Security Vulnerability Dataset Quality Is Critical" which revealed the impact of dataset issues on LLMs in vulnerability detection. (https://www.acsac.org/2024/program/final/s300.html) 2/6
#AIsecurity #LLM #Cybersecurity
The second paper in this session was Arasteh et al.'s "BinHunter: A Fine-Grained Graph Representation for Localizing Vulnerabilities in Binary Executables," showcasing a graph-based approach to vulnerability localization. (https://www.acsac.org/2024/program/final/s446.html) 3/6
#Cybersecurity
In the session's third slot was Guo et al.'s "CryptoPyt: Unraveling Python Cryptographic APIs Misuse With Precise Static Taint Analysis," a study that enhances security with a novel AST for detecting API misuse. (https://www.acsac.org/2024/program/final/s88.html) 4/6
#CryptographicAPIs #Cybersecurity
Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (https://www.acsac.org/2024/program/final/s223.html) 5/6
#Cybersecurity #BinaryAnalysis
Concluding the session was Draschbacher & Maar's "Manifest Problems: Analyzing Code Transparency for Android Application Bundles" which reveals severe design flaws in Google's Code Transparency scheme. (https://www.acsac.org/2024/program/final/s319.html) 6/6
#AndroidSecurity #AppSecurity #Cybersecurity