Pitfalls in language models for code intelligence: A taxonomy and survey
Modern language models (LMs) have been successfully employed in source code
generation and understanding, leading to a significant increase in research focused on …
generation and understanding, leading to a significant increase in research focused on …
Cctest: Testing and repairing code completion systems
Code completion, a highly valuable topic in the software development domain, has been
increasingly promoted for use by recent advances in large language models (LLMs). To …
increasingly promoted for use by recent advances in large language models (LLMs). To …
Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques
P Zhang, C Wu, M Peng, K Zeng, D Yu, Y Lai… - Proceedings of the 21st …, 2023 - dl.acm.org
Software obfuscation techniques can prevent binary diffing techniques from locating
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …
CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection
Binary code similarity detection (BCSD) is a fundamental technique for various applications.
Many BCSD solutions have been proposed recently, which mostly are embedding-based …
Many BCSD solutions have been proposed recently, which mostly are embedding-based …
An empirical study of blockchain system vulnerabilities: Modules, types, and patterns
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …
Faser: Binary code similarity search through the use of intermediate representations
Being able to identify functions of interest in cross-architecture software is useful whether
you are analysing for malware, securing the software supply chain or conducting …
you are analysing for malware, securing the software supply chain or conducting …
BinCola: Diversity-sensitive Contrastive Learning for Binary Code Similarity Detection
S Jiang, C Fu, S He, J Lv, L Han… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Binary Code Similarity Detection (BCSD) is a fundamental binary analysis technique in the
area of software security. Recently, advanced deep learning algorithms are integrated into …
area of software security. Recently, advanced deep learning algorithms are integrated into …
BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing
Binary code similarity analysis (BCSA) is a fundamental building block for various software
security, reverse engineering, and re-engineering applications. Existing research has …
security, reverse engineering, and re-engineering applications. Existing research has …
[HTML][HTML] BinCodex: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques
P Zhang, C Wu, Z Wang - BenchCouncil Transactions on Benchmarks …, 2024 - Elsevier
The binary code similarity detection (BCSD) technique can quantitatively measure the
differences between two given binaries and give matching results at predefined granularity …
differences between two given binaries and give matching results at predefined granularity …
Improving Malicious Traffic Detection with the Integration of Deep Neural Networks and Leveraging Hierarchical Attention Mechanism
The objective of this research is to improve the efficiency in identifying malicious traffic by
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …