Neural machine translation inspired binary code similarity comparison beyond function pairs
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …
corresponding source code. A binary, after disassembly, is expressed in an assembly …
αdiff: cross-version binary code similarity detection with dnn
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
A comparison of code similarity analysers
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
Given a closed-source program, such as most of proprietary software and viruses, binary
code analysis is indispensable for many tasks, such as code plagiarism detection and …
code analysis is indispensable for many tasks, such as code plagiarism detection and …
B in a rm: Scalable and efficient detection of vulnerabilities in firmware images of intelligent electronic devices
There is a widespread adoption of intelligent electronic devices (IEDs) in modern-day smart
grid deployments. Consequently, any vulnerabilities in IED firmware might greatly affect the …
grid deployments. Consequently, any vulnerabilities in IED firmware might greatly affect the …
Accurate and scalable cross-architecture cross-os binary code search with emulation
Different from source code clone detection, clone detection (similar code search) in binary
executables faces big challenges due to the gigantic differences in the syntax and the …
executables faces big challenges due to the gigantic differences in the syntax and the …
Binmatch: A semantics-based hybrid approach on binary code clone analysis
Binary code clone analysis is an important technique which has a wide range of applications
in software engineering (eg, plagiarism detection, bug detection). The main challenge of the …
in software engineering (eg, plagiarism detection, bug detection). The main challenge of the …
Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation
Learning-based clone detection is widely exploited for binary vulnerability search. Although
they solve the problem of high time overhead of traditional dynamic and static search …
they solve the problem of high time overhead of traditional dynamic and static search …
Malware lineage in the wild
Malware lineage studies the evolutionary relationships among malware and has important
applications for malware analysis. A persistent limitation of prior malware lineage …
applications for malware analysis. A persistent limitation of prior malware lineage …