A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

When malware is packin'heat; limits of machine learning classifiers based on static analysis features

H Aghakhani, F Gritti, F Mecca, M Lindorfer… - Network and …, 2020 - par.nsf.gov
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …

Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary

J Gao, X Yang, Y Fu, Y Jiang, J Sun - Proceedings of the 33rd ACM/IEEE …, 2018 - dl.acm.org
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arXiv preprint arXiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …

Practical binary code similarity detection with bert-based transferable similarity learning

S Ahn, S Ahn, H Koo, Y Paek - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …

An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …