Lemna: Explaining deep learning based security applications
While deep learning has shown a great potential in various domains, the lack of
transparency has limited its application in security or safety-critical areas. Existing research …
transparency has limited its application in security or safety-critical areas. Existing research …
Attention-based graph neural network for semi-supervised learning
Recently popularized graph neural networks achieve the state-of-the-art accuracy on a
number of standard benchmark datasets for graph-based semi-supervised learning …
number of standard benchmark datasets for graph-based semi-supervised learning …
Neural code comprehension: A learnable representation of code semantics
T Ben-Nun, AS Jakobovits… - Advances in neural …, 2018 - proceedings.neurips.cc
With the recent success of embeddings in natural language processing, research has been
conducted into applying similar methods to code analysis. Most works attempt to process the …
conducted into applying similar methods to code analysis. Most works attempt to process the …
Neural machine translation inspired binary code similarity comparison beyond function pairs
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …
corresponding source code. A binary, after disassembly, is expressed in an assembly …
αdiff: cross-version binary code similarity detection with dnn
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
Debin: Predicting debug information in stripped binaries
We present a novel approach for predicting debug information in stripped binaries. Using
machine learning, we first train probabilistic models on thousands of non-stripped binaries …
machine learning, we first train probabilistic models on thousands of non-stripped binaries …
Precise and accurate patch presence test for binaries
Patching is the main resort to battle software vulnerabilities. It is critical to ensure that
patches are propagated to all affected software timely, which, unfortunately, is often not the …
patches are propagated to all affected software timely, which, unfortunately, is often not the …
A cross-architecture instruction embedding model for natural language processing-inspired binary code analysis
Given a closed-source program, such as most of proprietary software and viruses, binary
code analysis is indispensable for many tasks, such as code plagiarism detection and …
code analysis is indispensable for many tasks, such as code plagiarism detection and …
CSI neural network: Using side-channels to recover your artificial neural network information
Machine learning has become mainstream across industries. Numerous examples proved
the validity of it for security applications. In this work, we investigate how to reverse engineer …
the validity of it for security applications. In this work, we investigate how to reverse engineer …