A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Challenges in firmware re-hosting, emulation, and analysis
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …
various security and performance related questions, such as determining whether a …
The art, science, and engineering of fuzzing: A survey
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …
Rwguard: A real-time detection system against cryptographic ransomware
Ransomware has recently (re) emerged as a popular malware that targets a wide range of
victims-from individual users to corporate ones for monetary gain. Our key observation on …
victims-from individual users to corporate ones for monetary gain. Our key observation on …
Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense
A wave of alternative coins that can be effectively mined without specialized hardware, and
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …
a surge in cryptocurrencies' market value has led to the development of cryptocurrency …
[HTML][HTML] Cryptographic ransomware encryption detection: Survey
The ransomware threat has loomed over our digital life since 1989. Criminals use this type
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …
of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts …
An ontology-driven framework for knowledge representation of digital extortion attacks
M Keshavarzi, HR Ghaffary - Computers in Human Behavior, 2023 - Elsevier
With the COVID-19 pandemic and the growing influence of the Internet in critical sectors of
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
industry and society, cyberattacks have not only not declined, but have risen sharply. In the …
{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …
patch analysis, have been widely employed in various software security analysis tasks, such …
A survey of deep learning techniques for cybersecurity in mobile networks
The widespread use of mobile devices, as well as the increasing popularity of mobile
services has raised serious cybersecurity challenges. In the last years, the number of …
services has raised serious cybersecurity challenges. In the last years, the number of …
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …
including plagiarism detection, software license violation detection, and vulnerability …