Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

B2sfinder: Detecting open-source software reuse in cots software

Z Yuan, M Feng, F Li, G Ban, Y Xiao… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
COTS software products are developed extensively on top of OSS projects, resulting in OSS
reuse vulnerabilities. To detect such vulnerabilities, finding OSS reuses in COTS software …

Semantic learning based cross-platform binary vulnerability search for IoT devices

J Gao, X Yang, Y Jiang, H Song… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The rapid development of Internet of Things (IoT) has triggered more security requirements
than ever, especially in detecting vulnerabilities in various IoT devices. The widely used …

A comparison of three popular source code similarity tools for detecting student plagiarism

A Ahadi, L Mathieson - Proceedings of the Twenty-First Australasian …, 2019 - dl.acm.org
This paper investigates automated code plagiarism detection in the context of an
undergraduate level data structures and algorithms module. We compare three software …

Tainting-assisted and context-migrated symbolic execution of android framework for vulnerability discovery and exploit generation

L Luo, Q Zeng, C Cao, K Chen, J Liu… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Android Application Framework is an integral and foundational part of the Android system.
Each of the two billion (as of 2017) Android devices relies on the system services of Android …

A semantics-based hybrid approach on binary code similarity comparison

Y Hu, H Wang, Y Zhang, B Li… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Binary code similarity comparison is a methodology for identifying similar or identical code
fragments in binary programs. It is indispensable in fields of software engineering and …

A consistently-executing graph-based approach for malware packer identification

X Li, Z Shan, F Liu, Y Chen, Y Hou - IEEE Access, 2019 - ieeexplore.ieee.org
Packing is the most common malware obfuscation technique employed to evade detection
by anti-virus systems. With the explosive growth of packed malware, packer identification …

Automatically patching vulnerabilities of binary programs via code transfer from correct versions

Y Hu, Y Zhang, D Gu - IEEE Access, 2019 - ieeexplore.ieee.org
The security of binary programs is significantly threatened by software vulnerabilities. When
vulnerabilities are found, those applications are exposed to malicious attacks that exploit the …

Obfuscation-resilient code recognition in Android apps

J Feichtner, C Rabensteiner - … of the 14th international conference on …, 2019 - dl.acm.org
Many Android developers take advantage of third-party libraries and code snippets from
public sources to add functionality to apps. Besides making development more productive …

Semantic learning and emulation based cross-platform binary vulnerability seeker

J Gao, Y Jiang, Z Liu, X Yang, C Wang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Clone detection is widely exploited for software vulnerability search. The approaches based
on source code analysis cannot be applied to binary clone detection because the same …