Skip to main content

Showing 1–8 of 8 results for author: Allix, K

.
  1. arXiv:2308.01413  [pdf, other

    cs.CL cs.AI

    LaFiCMIL: Rethinking Large File Classification from the Perspective of Correlated Multiple Instance Learning

    Authors: Tiezhu Sun, Weiguo Pian, Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Transfomer-based models have significantly advanced natural language processing, in particular the performance in text classification tasks. Nevertheless, these models face challenges in processing large files, primarily due to their input constraints, which are generally restricted to hundreds or thousands of tokens. Attempts to address this issue in existing models usually consist in extracting… ▽ More

    Submitted 23 May, 2024; v1 submitted 30 July, 2023; originally announced August 2023.

    Comments: Accepted at NLDB 2024

  2. arXiv:2212.05976  [pdf, other

    cs.SE cs.AI

    DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android Bytecode

    Authors: Tiezhu Sun, Kevin Allix, Kisub Kim, Xin Zhou, Dongsun Kim, David Lo, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: The automation of a large number of software engineering tasks is becoming possible thanks to Machine Learning (ML). Central to applying ML to software artifacts (like source or executable code) is converting them into forms suitable for learning. Traditionally, researchers have relied on manually selected features, based on expert knowledge which is sometimes imprecise and generally incomplete. R… ▽ More

    Submitted 24 August, 2023; v1 submitted 12 December, 2022; originally announced December 2022.

    Comments: Accepted by IEEE TSE, 2023

  3. arXiv:2205.08265  [pdf, other

    cs.CR cs.AI

    A two-steps approach to improve the performance of Android malware detectors

    Authors: Nadia Daoudi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: The popularity of Android OS has made it an appealing target to malware developers. To evade detection, including by ML-based techniques, attackers invest in creating malware that closely resemble legitimate apps. In this paper, we propose GUIDED RETRAINING, a supervised representation learning-based method that boosts the performance of a malware detector. First, the dataset is split into "easy"… ▽ More

    Submitted 17 May, 2022; originally announced May 2022.

  4. arXiv:2112.10469  [pdf, other

    cs.SE

    JuCify: A Step Towards Android Code Unification for Enhanced Static Analysis

    Authors: Jordan Samhi, Jun Gao, Nadia Daoudi, Pierre Graux, Henri Hoyez, Xiaoyu Sun, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Native code is now commonplace within Android app packages where it co-exists and interacts with Dex bytecode through the Java Native Interface to deliver rich app functionalities. Yet, state-of-the-art static analysis approaches have mostly overlooked the presence of such native code, which, however, may implement some key sensitive, or even malicious, parts of the app behavior. This limitation o… ▽ More

    Submitted 23 January, 2022; v1 submitted 20 December, 2021; originally announced December 2021.

    Comments: In the proceedings of the 44th International Conference on Software Engineering 2022 (ICSE 2022)

  5. arXiv:2109.03326  [pdf, ps, other

    cs.CR cs.LG

    DexRay: A Simple, yet Effective Deep Learning Approach to Android Malware Detection based on Image Representation of Bytecode

    Authors: Nadia Daoudi, Jordan Samhi, Abdoul Kader Kabore, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Computer vision has witnessed several advances in recent years, with unprecedented performance provided by deep representation learning research. Image formats thus appear attractive to other fields such as malware detection, where deep learning on images alleviates the need for comprehensively hand-crafted features generalising to different malware variants. We postulate that this research direct… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

    Comments: This manuscript has been accepted at MLHat 2021, and it will be archived in Springer Communications in Computer and Information Science (CCIS)

  6. arXiv:2006.11002  [pdf, other

    cs.SE cs.CY

    A First Look at Android Applications in Google Play related to Covid-19

    Authors: Jordan Samhi, Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein

    Abstract: Due to the convenience of access-on-demand to information and business solutions, mobile apps have become an important asset in the digital world. In the context of the Covid-19 pandemic, app developers have joined the response effort in various ways by releasing apps that target different user bases (e.g., all citizens or journalists), offer different services (e.g., location tracking or diagnost… ▽ More

    Submitted 15 January, 2021; v1 submitted 19 June, 2020; originally announced June 2020.

    Comments: Accepted in Empirical Software Engineering under reference: EMSE-D-20-00211R1

  7. arXiv:2001.09148  [pdf, other

    cs.SE

    Learning to Catch Security Patches

    Authors: Arthur D. Sawadogo, Tegawendé F. Bissyandé, Naouel Moha, Kevin Allix, Jacques Klein, Li Li, Yves Le Traon

    Abstract: Timely patching is paramount to safeguard users and maintainers against dire consequences of malicious attacks. In practice, patching is prioritized following the nature of the code change that is committed in the code repository. When such a change is labeled as being security-relevant, i.e., as fixing a vulnerability, maintainers rapidly spread the change and users are notified about the need to… ▽ More

    Submitted 24 January, 2020; originally announced January 2020.

  8. arXiv:1208.4536  [pdf, ps, other

    cs.CR cs.SE

    In-Vivo Bytecode Instrumentation for Improving Privacy on Android Smartphones in Uncertain Environments

    Authors: Alexandre Bartel, Jacques Klein, Martin Monperrus, Kevin Allix, Yves Le Traon

    Abstract: In this paper we claim that an efficient and readily applicable means to improve privacy of Android applications is: 1) to perform runtime monitoring by instrumenting the application bytecode and 2) in-vivo, i.e. directly on the smartphone. We present a tool chain to do this and present experimental results showing that this tool chain can run on smartphones in a reasonable amount of time and with… ▽ More

    Submitted 8 October, 2013; v1 submitted 5 June, 2012; originally announced August 2012.

    Comments: ISBN: 978-2-87971-111-9