Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis

H Wang, Z Liu, S Wang, Y Wang… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Software composition analysis (SCA) has attracted the attention of the industry and
academic community in recent years. Given a piece of program source code, SCA facilitates …

BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching

L Jiang, J An, H Huang, Q Tang, S Nie, S Wu… - Proceedings of the …, 2024 - dl.acm.org
While third-party libraries (TPLs) are extensively reused to enhance productivity during
software development, they can also introduce potential security risks such as vulnerability …

PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks

X Xu, Q Zheng, Z Yan, M Fan, A Jia… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Software vulnerabilities are easily propagated through code reuses, which pose dire threats
to software system security. Automatic patch presence test offers an effective way to detect …

Comparing One with Many--Solving Binary2source Function Matching Under Function Inlining

A Jia, M Fan, X Xu, W Jin, H Wang, Q Tang… - arXiv preprint arXiv …, 2022 - arxiv.org
Binary2source function matching is a fundamental task for many security applications,
including Software Component Analysis (SCA). The" 1-to-1" mechanism has been applied in …

FSmell: Recognizing Inline Function in Binary Code

W Lin, Q Guo, J Yin, X Zuo, R Wang, X Gong - European Symposium on …, 2023 - Springer
Function recognition is one of the most critical tasks in binary analysis and reverse
engineering. However, the recognition of inline functions still remains challenging. This is …

Cross-Inlining Binary Function Similarity Detection

A Jia, M Fan, X Xu, W Jin, H Wang, T Liu - Proceedings of the IEEE/ACM …, 2024 - dl.acm.org
Binary function similarity detection plays an important role in a wide range of security
applications. Existing works usually assume that the query function and target function share …

ReIFunc: Identifying Recurring Inline Functions in Binary Code

W Lin, Q Guo, DS Yu, J Yin, Q Gong… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Function inlining, although a common phenomenon, can greatly hinder the readability of the
binary code obtained through decompilation. Identifying inline functions in the binary code is …

CodeExtract: Enhancing Binary Code Similarity Detection with Code Extraction Techniques

L Jia, C Wu, P Zhang, Z Wang - Proceedings of the 25th ACM SIGPLAN …, 2024 - dl.acm.org
In the field of binary code similarity detection (BCSD), when dealing with functions in binary
form, the conventional approach is to identify a set of functions that are most similar to the …

INVESTIGATING THE EFFECT OF PEEPHOLE OPTIMIZATIONS ON BINARY CODE DIFFERENCES

X Ren - 2023 - mavmatrix.uta.edu
Binary diffing is a technique used to compare and identify differences or similarities in
executable files without access to source code. The potential applications of binary diffing in …

Highliner: seq2seq architectures for instruction level inlined identification in optimized binaries

L Dall'AGLIO - 2022 - politesi.polimi.it
The complexities introduced by compiler optimization have long stood as a major obstacle in
the field of binary analysis and reverse engineering. The function inlining optimization, in …