1 code implementation • 8 Jan 2021 • Laszlo Erdodi, Åvald Åslaugson Sommervoll, Fabio Massimo Zennaro
In this paper, we propose a formalization of the process of exploitation of SQL injection vulnerabilities.
1 code implementation • 30 Dec 2020 • William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro
Moreover, we subscribe to the hypothesis that code may be treated as natural language, and thus we process assembly code using standard architectures commonly employed in natural language processing.
1 code implementation • 26 May 2020 • Fabio Massimo Zennaro, Laszlo Erdodi
In this paper, we focus our attention on simplified penetration testing problems expressed in the form of capture the flag hacking challenges, and we analyze how model-free reinforcement learning algorithms may help to solve them.