Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Callee: Recovering call graphs for binaries with transfer and contrastive learning

W Zhu, Z Feng, Z Zhang, J Chen, Z Ou… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Recovering binary programs' call graphs is crucial for inter-procedural analysis tasks and
applications based on them. One of the core challenges is recognizing targets of indirect …

IFAttn: Binary code similarity analysis based on interpretable features with attention

S Jiang, C Fu, Y Qian, S He, J Lv, L Han - Computers & Security, 2022 - Elsevier
Binary code similarity analysis (BCSA 1) is meaningful in various software security
applications, including vulnerability discovery, clone detection, and malware detection …

A Review of Deep Learning-Based Binary Code Similarity Analysis

J Du, Q Wei, Y Wang, X Sun - Electronics, 2023 - mdpi.com
Against the backdrop of highly developed software engineering, code reuse has been
widely recognized as an effective strategy to significantly alleviate the burden of …

sem2vec: Semantics-aware Assembly Tracelet Embedding

H Wang, P Ma, S Wang, Q Tang, S Nie… - ACM Transactions on …, 2023 - dl.acm.org
Binary code similarity is the foundation of many security and software engineering
applications. Recent works leverage deep neural networks (DNN) to learn a numeric vector …

Xfl: Naming functions in binaries with extreme multi-label learning

J Patrick-Evans, M Dannehl… - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Reverse engineers benefit from the presence of identifiers such as function names in a
binary, but usually these are removed for release. Training a machine learning model to …

How far have we gone in stripped binary code understanding using large language models

X Shang, S Cheng, G Chen, Y Zhang, L Hu… - arXiv preprint arXiv …, 2024 - arxiv.org
Binary code analysis plays a pivotal role in various software security applications, such as
software maintenance, malware detection, software vulnerability discovery, patch analysis …

1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis

A Jia, M Fan, W Jin, X Xu, Z Zhou, Q Tang… - ACM Transactions on …, 2023 - dl.acm.org
Binary similarity analysis is critical to many code-reuse-related issues, where function
matching is its fundamental task.“1-to-1” mechanism has been applied in most binary …

Unleashing the power of pseudo-code for binary code similarity analysis

W Zhang, Z Xu, Y Xiao, Y Xue - Cybersecurity, 2022 - Springer
Code similarity analysis has become more popular due to its significant applicantions,
including vulnerability detection, malware detection, and patch analysis. Since the source …

Analyzing and revivifying function signature inference using deep learning

Y Lin, T Singhal, D Gao, D Lo - Empirical Software Engineering, 2024 - Springer
Function signature plays an important role in binary analysis and security enhancement,
with typical examples in bug finding and control-flow integrity enforcement. However …