Skip to main content

Showing 1–4 of 4 results for author: Heidbrink, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.10644  [pdf, other

    stat.ML cs.AI cs.CR cs.LG

    Using Neural Architecture Search for Improving Software Flaw Detection in Multimodal Deep Learning Models

    Authors: Alexis Cooper, Xin Zhou, Scott Heidbrink, Daniel M. Dunlavy

    Abstract: Software flaw detection using multimodal deep learning models has been demonstrated as a very competitive approach on benchmark problems. In this work, we demonstrate that even better performance can be achieved using neural architecture search (NAS) combined with multimodal learning models. We adapt a NAS framework aimed at investigating image classification to the problem of software flaw detect… ▽ More

    Submitted 22 September, 2020; originally announced September 2020.

    Comments: 10 pages, 5 figures, 4 tables

    Report number: SAND2020-10141R

  2. arXiv:2009.04549  [pdf, other

    cs.LG cs.AI cs.CR cs.SE stat.ML

    Multimodal Deep Learning for Flaw Detection in Software Programs

    Authors: Scott Heidbrink, Kathryn N. Rodhouse, Daniel M. Dunlavy

    Abstract: We explore the use of multiple deep learning models for detecting flaws in software programs. Current, standard approaches for flaw detection rely on a single representation of a software program (e.g., source code or a program binary). We illustrate that, by using techniques from multimodal deep learning, we can simultaneously leverage multiple representations of software programs to improve flaw… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: 13 pages, 2 figures, 5 tables

    Report number: SAND2020-9429R

  3. arXiv:1610.08570  [pdf, other

    cs.CR

    TrustBase: An Architecture to Repair and Strengthen Certificate-based Authentication

    Authors: Mark O'Neill, Scott Heidbrink, Jordan Whitehead, Scott Ruoti, Dan Bunker, Kent Seamons, Daniel Zappala

    Abstract: We describe TrustBase, an architecture that provides certificate-based authentication as an operating system service. TrustBase enforces best practices for certificate validation for all applications and transparently enables existing applications to be strengthened against failures of the CA system. The TrustBase system allows simple deployment of authentication systems that harden the CA system.… ▽ More

    Submitted 26 October, 2016; originally announced October 2016.

    Comments: 15 pages, 4 figures

  4. "We're on the Same Page": A Usability Study of Secure Email Using Pairs of Novice Users

    Authors: Scott Ruoti, Jeff Andersen, Scott Heidbrink, Mark O'Neil, Elham Vaziripour, Justin Wu, Daniel Zappala, Kent Seamons

    Abstract: Secure email is increasingly being touted as usable by novice users, with a push for adoption based on recent concerns about government surveillance. To determine whether secure email is for grassroots adoption, we employ a laboratory user study that recruits pairs of novice to install and use several of the latest systems to exchange secure messages. We present quantitative and qualitative result… ▽ More

    Submitted 11 January, 2016; v1 submitted 28 October, 2015; originally announced October 2015.

    Comments: 34th Annual ACM Conference on Human Factors in Computing Systems (CHI 2016)

    ACM Class: H.1.2; H.5.2