Neural machine translation inspired binary code similarity comparison beyond function pairs

F Zuo, X Li, P Young, L Luo, Q Zeng… - arXiv preprint arXiv …, 2018 - arxiv.org
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …

αdiff: cross-version binary code similarity detection with dnn

B Liu, W Huo, C Zhang, W Li, F Li, A Piao… - Proceedings of the 33rd …, 2018 - dl.acm.org
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …

Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary

J Gao, X Yang, Y Fu, Y Jiang, J Sun - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …

A comparison of code similarity analysers

C Ragkhitwetsagul, J Krinke, D Clark - Empirical Software Engineering, 2018 - Springer
Copying and pasting of source code is a common activity in software engineering. Often, the
code is not copied as it is and it may be modified for various purposes; eg refactoring, bug …

A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis

K Redmond, L Luo, Q Zeng - arXiv preprint arXiv:1812.09652, 2018 - arxiv.org
Given a closed-source program, such as most of proprietary software and viruses, binary
code analysis is indispensable for many tasks, such as code plagiarism detection and …

B in a rm: Scalable and efficient detection of vulnerabilities in firmware images of intelligent electronic devices

P Shirani, L Collard, BL Agba, B Lebel… - Detection of Intrusions …, 2018 - Springer
There is a widespread adoption of intelligent electronic devices (IEDs) in modern-day smart
grid deployments. Consequently, any vulnerabilities in IED firmware might greatly affect the …

Accurate and scalable cross-architecture cross-os binary code search with emulation

Y Xue, Z Xu, M Chandramohan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Different from source code clone detection, clone detection (similar code search) in binary
executables faces big challenges due to the gigantic differences in the syntax and the …

Binmatch: A semantics-based hybrid approach on binary code clone analysis

Y Hu, Y Zhang, J Li, H Wang, B Li… - 2018 IEEE international …, 2018 - ieeexplore.ieee.org
Binary code clone analysis is an important technique which has a wide range of applications
in software engineering (eg, plagiarism detection, bug detection). The main challenge of the …

Vulseeker-pro: Enhanced semantic learning based binary vulnerability seeker with emulation

J Gao, X Yang, Y Fu, Y Jiang, H Shi, J Sun - … of the 2018 26th ACM Joint …, 2018 - dl.acm.org
Learning-based clone detection is widely exploited for binary vulnerability search. Although
they solve the problem of high time overhead of traditional dynamic and static search …

Malware lineage in the wild

IU Haq, S Chica, J Caballero, S Jha - Computers & Security, 2018 - Elsevier
Malware lineage studies the evolutionary relationships among malware and has important
applications for malware analysis. A persistent limitation of prior malware lineage …