Others

Can we learn from observations rules that are useful for security analysis such as taint analysis rules? In this line of work, we use ML to power analyses useful for security analysis.

Relevant Publications
One Engine To Serve 'em All: Inferring Taint Rules Without Architectural Semantics
Zheng Leong Chua, Yanhao Wang, Prateek Saxena, Zhenkai Liang, Purui Su
Network and Distributed System Security Symposium (NDSS 2019). San Diego, CA, Feb 2019.
PDF