Automated assessment in computer science education: A state-of-the-art review
Practical programming competencies are critical to the success in computer science (CS)
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …
A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
Practical binary code similarity detection with bert-based transferable similarity learning
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …
applications, including software plagiarism, malware classification, and known vulnerability …
Learning approximate execution semantics from traces for binary function similarity
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …
usages including vulnerability detection, malware analysis, and forensics–requires …
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …
including plagiarism detection, software license violation detection, and vulnerability …
Unleashing the power of compiler intermediate representation to enhance neural program embeddings
Neural program embeddings have demonstrated considerable promise in a range of
program analysis tasks, including clone identification, program repair, code completion, and …
program analysis tasks, including clone identification, program repair, code completion, and …
jtrans: Jump-aware transformer for binary code similarity
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerability detection, software component analysis, and reverse engineering. Recent …
vulnerability detection, software component analysis, and reverse engineering. Recent …
Libdb: An effective and efficient framework for detecting third-party libraries in binaries
Third-party libraries (TPLs) are reused frequently in software applications for reducing
development cost. However, they could introduce security risks as well. Many TPL detection …
development cost. However, they could introduce security risks as well. Many TPL detection …