[HTML][HTML] Attacks and defences on intelligent connected vehicles: A survey

M Dibaei, X Zheng, K Jiang, R Abbas, S Liu… - Digital Communications …, 2020 - Elsevier
Intelligent vehicles are advancing at a fast speed with the improvement of automation and
connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Graph matching networks for learning the similarity of graph structured objects

Y Li, C Gu, T Dullien, O Vinyals… - … conference on machine …, 2019 - proceedings.mlr.press
This paper addresses the challenging problem of retrieval and matching of graph structured
objects, and makes two key contributions. First, we demonstrate how Graph Neural …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Neural network-based graph embedding for cross-platform binary code similarity detection

X Xu, C Liu, Q Feng, H Yin, L Song… - Proceedings of the 2017 …, 2017 - dl.acm.org
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Scalable graph-based bug search for firmware images

Q Feng, R Zhou, C Xu, Y Cheng, B Testa… - Proceedings of the 2016 …, 2016 - dl.acm.org
Because of rampant security breaches in IoT devices, searching vulnerabilities in massive
IoT ecosystems is more crucial than ever. Recent studies have demonstrated that control …