A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …
paramount importance. The embedded systems are very frequently used in both security …
A blockchain-based code copyright management system
N Jing, Q Liu, V Sugumaran - Information Processing & Management, 2021 - Elsevier
With the increasing number of open-source software projects, code plagiarism has become
one of the threats to the software industry. However, current research on code copyright …
one of the threats to the software industry. However, current research on code copyright …
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection
S Yang, L Cheng, Y Zeng, Z Lang… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Binary code similarity detection is a fundamental technique for many security applications
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
Unleashing the hidden power of compiler optimization on binary code difference: An empirical study
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …
applications in software security. Due to the high variability of binary code, existing solutions …
XBlock-EOS: Extracting and exploring blockchain data from EOSIO
Blockchain-based cryptocurrencies and applications have flourished in blockchain research
community. Massive data generated from diverse blockchain systems bring not only huge …
community. Massive data generated from diverse blockchain systems bring not only huge …
Academic source code plagiarism detection by measuring program behavioral similarity
Source code plagiarism is a long-standing issue in tertiary computer science education.
Many source code plagiarism detection tools have been proposed to aid in the detection of …
Many source code plagiarism detection tools have been proposed to aid in the detection of …
Buggraph: Differentiating source-binary code similarity with graph triplet-loss network
Binary code similarity detection, which answers whether two pieces of binary code are
similar, has been used in a number of applications, such as vulnerability detection and …
similar, has been used in a number of applications, such as vulnerability detection and …
{SANRAZOR}: Reducing redundant sanitizer checks in {C/C++} programs
Sanitizers detect unsafe actions such as invalid memory accesses by inserting checks that
are validated during a program's execution. Despite their extensive use for debugging and …
are validated during a program's execution. Despite their extensive use for debugging and …
Interpretation-enabled software reuse detection based on a multi-level birthmark model
Software reuse, especially partial reuse, poses legal and security threats to software
development. Since its source codes are usually unavailable, software reuse is hard to be …
development. Since its source codes are usually unavailable, software reuse is hard to be …