Can a Deep Learning Model for One Architecture Be Used for Others?{Retargeted-Architecture} Binary Code Analysis

J Wang, M Sharp, C Wu, Q Zeng, L Luo - 32nd USENIX Security …, 2023 - usenix.org
NLP-inspired deep learning for binary code analysis demonstrates notable performance.
Considering the diverse Instruction Set Architectures (ISAs) on the market, it is important to …

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention

Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …

Asteria-Pro: Enhancing Deep Learning-based Binary Code Similarity Detection by Incorporating Domain Knowledge

S Yang, C Dong, Y Xiao, Y Cheng, Z Shi, Z Li… - ACM Transactions on …, 2023 - dl.acm.org
Widespread code reuse allows vulnerabilities to proliferate among a vast variety of firmware.
There is an urgent need to detect these vulnerable codes effectively and efficiently. By …

Nova: Generative Language Models for Binaries

N Jiang, C Wang, K Liu, X Xu, L Tan… - arXiv preprint arXiv …, 2023 - arxiv.org
Generative large language models (LLMs) pre-trained on code have shown impressive
effectiveness in code generation, program repair, and document analysis. However, existing …

Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques

P Zhang, C Wu, M Peng, K Zeng, D Yu, Y Lai… - Proceedings of the 21st …, 2023 - dl.acm.org
Software obfuscation techniques can prevent binary diffing techniques from locating
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …

sem2vec: Semantics-aware Assembly Tracelet Embedding

H Wang, P Ma, S Wang, Q Tang, S Nie… - ACM Transactions on …, 2023 - dl.acm.org
Binary code similarity is the foundation of many security and software engineering
applications. Recent works leverage deep neural networks (DNN) to learn a numeric vector …

1dFuzz: Reproduce 1-Day Vulnerabilities with Directed Differential Fuzzing

S Yang, Y He, K Chen, Z Ma, X Luo, Y Xie… - Proceedings of the …, 2023 - dl.acm.org
1-day vulnerabilities are common in practice and have posed severe threats to end users, as
adversaries could learn from released patches to find them and exploit them. Reproducing 1 …

SepBIN: Binary Feature Separation for Better Semantic Comparison and Authorship Verification

Q Song, Y Sang, Y Zhang, S Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Binary semantic comparison and authorship verification are critical in many security
applications. They respectively focus on the functional semantic features and developers' …

A Game-Based Framework to Compare Program Classifiers and Evaders

T Damásio, M Canesche, V Pacheco… - Proceedings of the 21st …, 2023 - dl.acm.org
Algorithm classification consists in determining which algorithm a program implements,
given a finite set of candidates. Classifiers are used in applications such malware …

Codeformer: A gnn-nested transformer model for binary code similarity detection

G Liu, X Zhou, J Pang, F Yue, W Liu, J Wang - Electronics, 2023 - mdpi.com
Binary code similarity detection is used to calculate the code similarity of a pair of binary
functions or files, through a certain calculation method and judgment method. It is a …