Difference between revisions of "TOOBAD4ML"
From Security Unileon
SecurityAdm (talk | contribs) (Created page with "== TOOBAD4ML ==") |
SecurityAdm (talk | contribs) |
||
Line 1: | Line 1: | ||
− | == | + | ''TOOl to Buffer Overflow Analysis and Description For Machine Learning'' (TOOBAD4ML) is a tool for extracting features of Buffer Overflow vulnerabilities written in C code in order to further analyze them with Machine Learning techniques. |
+ | |||
+ | [[File:TOOBAD4ML overview.png|720px|frame|center|TOOBAD4ML overview]] | ||
+ | |||
+ | The input consists of one or several ''.c'' files that are processed for lexical analysis. The aim of this analysis is to extract an arbitrary number of features that describe a Buffer Overflow. To do so, the input must be pre-tagged: either manually or by means of static code analysis. Finally, the output is a set of vector descriptors, which can be exported to various formats in order to create a dataset suitable to be analyzed using Machine Learning techniques. | ||
+ | |||
+ | == References == | ||
+ | |||
+ | * [[SVCP4C]] | ||
+ | |||
+ | == External Links == | ||
+ | |||
+ | * Source code |
Revision as of 16:14, 9 February 2021
TOOl to Buffer Overflow Analysis and Description For Machine Learning (TOOBAD4ML) is a tool for extracting features of Buffer Overflow vulnerabilities written in C code in order to further analyze them with Machine Learning techniques.
The input consists of one or several .c files that are processed for lexical analysis. The aim of this analysis is to extract an arbitrary number of features that describe a Buffer Overflow. To do so, the input must be pre-tagged: either manually or by means of static code analysis. Finally, the output is a set of vector descriptors, which can be exported to various formats in order to create a dataset suitable to be analyzed using Machine Learning techniques.
References
External Links
- Source code