Redirigiendo al acceso original de articulo en 15 segundos...
Inicio  /  Algorithms  /  Vol: 16 Par: 10 (2023)  /  Artículo
ARTÍCULO
TITULO

Evolutionary Approaches for Adversarial Attacks on Neural Source Code Classifiers

Valeria Mercuri    
Martina Saletta and Claudio Ferretti    

Resumen

As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential in identifying vulnerabilities; however, they are not immune to adversarial attacks. This paper presents a set of evolutionary techniques for generating adversarial instances to enhance the resilience of neural models used for vulnerability detection. The proposed approaches leverage an evolution strategy (ES) algorithm that utilizes as the fitness function the output of the neural network to deceive. By starting from existing instances, the algorithm evolves individuals, represented by source code snippets, by applying semantic-preserving transformations, while utilizing the fitness to invert their original classification. This iterative process facilitates the generation of adversarial instances that can mislead the vulnerability detection models while maintaining the original behavior of the source code. The significance of this research lies in its contribution to the field of cybersecurity by addressing the need for enhanced resilience against adversarial attacks in vulnerability detection models. The evolutionary approach provides a systematic framework for generating adversarial instances, allowing for the identification and mitigation of weaknesses in AI classifiers.

 Artículos similares

       
 
Francisco J. Soltero, Pablo Fernández-Blanco and J. Ignacio Hidalgo    
Technical indicators use graphic representations of datasets by applying various mathematical formulas to financial time series of prices. These formulas comprise a set of rules and parameters whose values are not necessarily known and depend on many fac... ver más
Revista: Applied Sciences

 
Zhenwei Yang, Hang Lv, Xinyi Wang, Hengrui Yan and Zhaofeng Xu    
In recent years, inrush water has hampered the regular mining of coal mines, and the proper identification of the source of inrush water is critical to the prevention and management of water hazards in mines. This paper extracts the standard water chemis... ver más
Revista: Water

 
Cora Hoerstmann, Sylke Wohlrab and Uwe John    
High-throughput sequencing technologies have revolutionized microbial diversity studies, shedding light on the oceans? plankton evolution, distribution, and biological activity. Whereas marine prokaryotes have been more extensively studied and specific m... ver más

 
Tatiana Karaseva and Eugene Semenkin    
Evolutionary approaches are widely applied in solving various types of problems. The paper considers the application of EvolODE and EvolODES approaches to the identification of dynamic systems. EvolODE helps to obtain a model in the form of an ordinary d... ver más
Revista: Algorithms

 
Aleksei Vakhnin and Evgenii Sopov    
Unconstrained continuous large-scale global optimization (LSGO) is still a challenging task for a wide range of modern metaheuristic approaches. A cooperative coevolution approach is a good tool for increasing the performance of an evolutionary algorithm... ver más
Revista: Algorithms