W Zhu, Z Feng, Z Zhang, J Chen, Z Ou… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recovering binary programs' call graphs is crucial for inter-procedural analysis tasks and applications based on them. One of the core challenges is recognizing targets of indirect …
S Jiang, C Fu, Y Qian, S He, J Lv, L Han - Computers & Security, 2022 - Elsevier
Binary code similarity analysis (BCSA 1) is meaningful in various software security applications, including vulnerability discovery, clone detection, and malware detection …
J Du, Q Wei, Y Wang, X Sun - Electronics, 2023 - mdpi.com
Against the backdrop of highly developed software engineering, code reuse has been widely recognized as an effective strategy to significantly alleviate the burden of …
Binary code similarity is the foundation of many security and software engineering applications. Recent works leverage deep neural networks (DNN) to learn a numeric vector …
J Patrick-Evans, M Dannehl… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Reverse engineers benefit from the presence of identifiers such as function names in a binary, but usually these are removed for release. Training a machine learning model to …
X Shang, S Cheng, G Chen, Y Zhang, L Hu… - arXiv preprint arXiv …, 2024 - arxiv.org
Binary code analysis plays a pivotal role in various software security applications, such as software maintenance, malware detection, software vulnerability discovery, patch analysis …
A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang… - ACM Transactions on …, 2023 - dl.acm.org
Binary similarity analysis is critical to many code-reuse-related issues, where function matching is its fundamental task.“1-to-1” mechanism has been applied in most binary …
W Zhang, Z Xu, Y Xiao, Y Xue - Cybersecurity, 2022 - Springer
Code similarity analysis has become more popular due to its significant applicantions, including vulnerability detection, malware detection, and patch analysis. Since the source …
Y Lin, T Singhal, D Gao, D Lo - Empirical Software Engineering, 2024 - Springer
Function signature plays an important role in binary analysis and security enhancement, with typical examples in bug finding and control-flow integrity enforcement. However …