A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
When malware is packin'heat; limits of machine learning classifiers based on static analysis features
Machine learning techniques are widely used in addition to signatures and heuristics to
increase the detection rate of anti-malware software, as they automate the creation of …
increase the detection rate of anti-malware software, as they automate the creation of …
Vulseeker: A semantic learning based vulnerability seeker for cross-platform binary
Code reuse improves software development efficiency, however, vulnerabilities can be
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
introduced inadvertently. Many existing works compute the code similarity based on CFGs to …
[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …
vulnerabilities, threatening software security. Unfortunately, with the development and …
Trex: Learning execution semantics from micro-traces for binary similarity
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …
security usages including vulnerability detection, malware lineage, and forensics--requires …
Practical binary code similarity detection with bert-based transferable similarity learning
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …
applications, including software plagiarism, malware classification, and known vulnerability …
An inside look into the practice of malware analysis
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …
for a successful attack and identify the possible impacts of the attack. While there has been …
GraphSPD: Graph-based security patch detection with enriched code semantics
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …
widely propagating to downstream software. Due to different maintenance policies, software …