A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Rwguard: A real-time detection system against cryptographic ransomware

S Mehnaz, A Mudgerikar, E Bertino - International Symposium on …, 2018 - Springer
Ransomware has recently (re) emerged as a popular malware that targets a wide range of
victims-from individual users to corporate ones for monetary gain. Our key observation on …

Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense

RK Konoth, E Vineti, V Moonsamy, M Lindorfer… - Proceedings of the …, 2018 - dl.acm.org
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …

[HTML][HTML] Cryptographic ransomware encryption detection: Survey

K Begovic, A Al-Ali, Q Malluhi - Computers & Security, 2023 - Elsevier
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …

An ontology-driven framework for knowledge representation of digital extortion attacks

M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

A survey of deep learning techniques for cybersecurity in mobile networks

E Rodriguez, B Otero, N Gutierrez… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The widespread use of mobile devices, as well as the increasing popularity of mobile
services has raised serious cybersecurity challenges. In the last years, the number of …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …