A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Layered obfuscation: a taxonomy of software obfuscation techniques for layered security
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …
the communities is what security strength the technique can achieve. Nowadays, this …
Opening the blackbox of virustotal: Analyzing online phishing scan engines
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
URLs and files. Unfortunately, it is not well understood how the labels are generated and …
Unleashing the hidden power of compiler optimization on binary code difference: An empirical study
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …
applications in software security. Due to the high variability of binary code, existing solutions …
Jshrink: In-depth investigation into debloating modern java applications
Modern software is bloated. Demand for new functionality has led developers to include
more and more features, many of which become unneeded or unused as software evolves …
more and more features, many of which become unneeded or unused as software evolves …
MDCHD: A novel malware detection method in cloud using hardware trace and deep learning
With the development of cloud computing, more and more enterprises and institutes have
deployed important computing tasks and data into virtualization environments. Virtualization …
deployed important computing tasks and data into virtualization environments. Virtualization …
Loki: Hardening code obfuscation against automated attacks
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …
digital rights within our society. Despite its huge practical importance, both commercial and …
MDGraph: A novel malware detection method based on memory dump and graph neural network
Malware detection is of great importance to computer security. Although the malware
detection approaches have made great progress in recent years, these methods are still …
detection approaches have made great progress in recent years, these methods are still …
{MBA-Blast}: Unveiling and Simplifying Mixed {Boolean-Arithmetic} Obfuscation
Mixed Boolean-Arithmetic (MBA) obfuscation is a method to perform a semantics-preserving
transformation from a simple expression to a representation that is hard to understand and …
transformation from a simple expression to a representation that is hard to understand and …
BinDeep: A deep learning approach to binary code similarity detection
Binary code similarity detection (BCSD) plays an important role in malware analysis and
vulnerability discovery. Existing methods mainly rely on the expert's knowledge for the …
vulnerability discovery. Existing methods mainly rely on the expert's knowledge for the …