trojan source code .pdf
3.5 MB
Trojan Source Code
"Trojan Source: Invisible Vulnerabilities", 2021.
]-> PoC:
https://github.com/nickboucher/trojan-source
]-> https://trojansource.codes
A new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards (Unicode) to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers...
#trojan
t.iss.one/Library_Sec
"Trojan Source: Invisible Vulnerabilities", 2021.
]-> PoC:
https://github.com/nickboucher/trojan-source
]-> https://trojansource.codes
A new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards (Unicode) to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers...
#trojan
t.iss.one/Library_Sec
Adversarial_Neuron_Pruning.pdf
1.3 MB
#Research
"Adversarial Neuron Pruning Purifies Backdoored Deep Models", 2021.
]-> https://github.com/csdongxian/ANP_backdoor
t.iss.one/Library_Sec
"Adversarial Neuron Pruning Purifies Backdoored Deep Models", 2021.
]-> https://github.com/csdongxian/ANP_backdoor
t.iss.one/Library_Sec