Automated assessment in computer science education: A state-of-the-art review

JC Paiva, JP Leal, Á Figueira - ACM Transactions on Computing …, 2022 - dl.acm.org
Practical programming competencies are critical to the success in computer science (CS)
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …

A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

Practical binary code similarity detection with bert-based transferable similarity learning

S Ahn, S Ahn, H Koo, Y Paek - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Unleashing the power of compiler intermediate representation to enhance neural program embeddings

Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie… - Proceedings of the 44th …, 2022 - dl.acm.org
Neural program embeddings have demonstrated considerable promise in a range of
program analysis tasks, including clone identification, program repair, code completion, and …

jtrans: Jump-aware transformer for binary code similarity

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - arXiv preprint arXiv …, 2022 - arxiv.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerability detection, software component analysis, and reverse engineering. Recent …

Libdb: An effective and efficient framework for detecting third-party libraries in binaries

W Tang, Y Wang, H Zhang, S Han, P Luo… - Proceedings of the 19th …, 2022 - dl.acm.org
Third-party libraries (TPLs) are reused frequently in software applications for reducing
development cost. However, they could introduce security risks as well. Many TPL detection …