Pitfalls in language models for code intelligence: A taxonomy and survey

X She, Y Liu, Y Zhao, Y He, L Li… - arXiv preprint arXiv …, 2023 - arxiv.org
Modern language models (LMs) have been successfully employed in source code
generation and understanding, leading to a significant increase in research focused on …

Cctest: Testing and repairing code completion systems

Z Li, C Wang, Z Liu, H Wang, D Chen… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Code completion, a highly valuable topic in the software development domain, has been
increasingly promoted for use by recent advances in large language models (LLMs). To …

Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques

P Zhang, C Wu, M Peng, K Zeng, D Yu, Y Lai… - Proceedings of the 21st …, 2023 - dl.acm.org
Software obfuscation techniques can prevent binary diffing techniques from locating
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …

CEBin: A Cost-Effective Framework for Large-Scale Binary Code Similarity Detection

H Wang, Z Gao, C Zhang, M Sun, Y Zhou… - Proceedings of the 33rd …, 2024 - dl.acm.org
Binary code similarity detection (BCSD) is a fundamental technique for various applications.
Many BCSD solutions have been proposed recently, which mostly are embedding-based …

An empirical study of blockchain system vulnerabilities: Modules, types, and patterns

X Yi, D Wu, L Jiang, Y Fang, K Zhang… - Proceedings of the 30th …, 2022 - dl.acm.org
Blockchain, as a distributed ledger technology, becomes increasingly popular, especially for
enabling valuable cryptocurrencies and smart contracts. However, the blockchain software …

Faser: Binary code similarity search through the use of intermediate representations

J Collyer, T Watson, I Phillips - arXiv preprint arXiv:2310.03605, 2023 - arxiv.org
Being able to identify functions of interest in cross-architecture software is useful whether
you are analysing for malware, securing the software supply chain or conducting …

BinCola: Diversity-sensitive Contrastive Learning for Binary Code Similarity Detection

S Jiang, C Fu, S He, J Lv, L Han… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Binary Code Similarity Detection (BCSD) is a fundamental binary analysis technique in the
area of software security. Recently, advanced deep learning algorithms are integrated into …

BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing

WK Wong, H Wang, Z Li, S Wang - Proceedings of the 46th IEEE/ACM …, 2024 - dl.acm.org
Binary code similarity analysis (BCSA) is a fundamental building block for various software
security, reverse engineering, and re-engineering applications. Existing research has …

[HTML][HTML] BinCodex: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques

P Zhang, C Wu, Z Wang - BenchCouncil Transactions on Benchmarks …, 2024 - Elsevier
The binary code similarity detection (BCSD) technique can quantitatively measure the
differences between two given binaries and give matching results at predefined granularity …

Improving Malicious Traffic Detection with the Integration of Deep Neural Networks and Leveraging Hierarchical Attention Mechanism

C Gupta, A Khang - Revolutionizing the AI-Digital Landscape, 2024 - taylorfrancis.com
The objective of this research is to improve the efficiency in identifying malicious traffic by
integrating a deep neural network that utilizes a hierarchical attention mechanism. The …