EVIL (Exploiting software VIa natural Language) is an approach to automatically generate software exploits in assembly/Python language from descriptions in natural language. The approach leverages Neural Machine Translation (NMT) techniques and a dataset that we developed for this work.
For example, in python dataset,
in the file "encoder-train.in", line 3230 is "define the method serialize_headers with an argument self."
in the file "encoder-train.out", line 3230 is "def streaming_content ( self ) :"
This is with an obvious method name error.
Errors such as this exist in large numbers in the dataset, resulting in one input and multiple outputs after IP resolution.
For example, above data after IP, is:
"define the method var0 with an argument self." and "def streaming_content ( self ) :"
The placeholder var0 does not represent the code correctly.