Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis
Software composition analysis (SCA) has attracted the attention of the industry and
academic community in recent years. Given a piece of program source code, SCA facilitates …
academic community in recent years. Given a piece of program source code, SCA facilitates …
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching
While third-party libraries (TPLs) are extensively reused to enhance productivity during
software development, they can also introduce potential security risks such as vulnerability …
software development, they can also introduce potential security risks such as vulnerability …
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks
Software vulnerabilities are easily propagated through code reuses, which pose dire threats
to software system security. Automatic patch presence test offers an effective way to detect …
to software system security. Automatic patch presence test offers an effective way to detect …
Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining
Binary2source function matching is a fundamental task for many security applications,
including Software Component Analysis (SCA). The" 1-to-1" mechanism has been applied in …
including Software Component Analysis (SCA). The" 1-to-1" mechanism has been applied in …
FSmell: Recognizing Inline Function in Binary Code
W Lin, Q Guo, J Yin, X Zuo, R Wang, X Gong - European Symposium on …, 2023 - Springer
Function recognition is one of the most critical tasks in binary analysis and reverse
engineering. However, the recognition of inline functions still remains challenging. This is …
engineering. However, the recognition of inline functions still remains challenging. This is …
Cross-Inlining Binary Function Similarity Detection
Binary function similarity detection plays an important role in a wide range of security
applications. Existing works usually assume that the query function and target function share …
applications. Existing works usually assume that the query function and target function share …
ReIFunc: Identifying Recurring Inline Functions in Binary Code
W Lin, Q Guo, DS Yu, J Yin, Q Gong… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Function inlining, although a common phenomenon, can greatly hinder the readability of the
binary code obtained through decompilation. Identifying inline functions in the binary code is …
binary code obtained through decompilation. Identifying inline functions in the binary code is …
CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques
L Jia, C Wu, P Zhang, Z Wang - Proceedings of the 25th ACM SIGPLAN …, 2024 - dl.acm.org
In the field of binary code similarity detection (BCSD), when dealing with functions in binary
form, the conventional approach is to identify a set of functions that are most similar to the …
form, the conventional approach is to identify a set of functions that are most similar to the …
INVESTIGATING THE EFFECT OF PEEPHOLE OPTIMIZATIONS ON BINARY CODE DIFFERENCES
X Ren - 2023 - mavmatrix.uta.edu
Binary diffing is a technique used to compare and identify differences or similarities in
executable files without access to source code. The potential applications of binary diffing in …
executable files without access to source code. The potential applications of binary diffing in …
Highliner: seq2seq architectures for instruction level inlined identification in optimized binaries
L Dall'AGLIO - 2022 - politesi.polimi.it
The complexities introduced by compiler optimization have long stood as a major obstacle in
the field of binary analysis and reverse engineering. The function inlining optimization, in …
the field of binary analysis and reverse engineering. The function inlining optimization, in …