[PDF][PDF] What the fork? finding and analyzing malware in github forks

A Cao, B Dolan-Gavitt - Proc. of NDSS, 2022 - ndss-symposium.org
On GitHub, open-source developers use the fork feature to create server-side clones and
implement code changes separately before creating pull requests. However, such fork …

Binprov: Binary code provenance identification without disassembly

X He, S Wang, Y Xing, P Feng, H Wang, Q Li… - Proceedings of the 25th …, 2022 - dl.acm.org
Provenance identification, which is essential for binary analysis, aims to uncover the specific
compiler and configuration used for generating the executable. Traditionally, the existing …

Is Function Similarity Over-Engineered? Building a Benchmark

R Saul, C Liu, N Fleischmann, R Zak, K Micinski… - arXiv preprint arXiv …, 2024 - arxiv.org
Binary analysis is a core component of many critical security tasks, including reverse
engineering, malware analysis, and vulnerability detection. Manual analysis is often time …

Bingo: Identifying security patches in binary code with graph representation learning

X He, S Wang, P Feng, X Wang, S Sun, Q Li… - Proceedings of the 19th …, 2024 - dl.acm.org
A timely software update is vital to combat the increasing security vulnerabilities. However,
some software vendors may secretly patch their vulnerabilities without creating CVE entries …

[HTML][HTML] Identifying runtime libraries in statically linked Linux binaries

J Carrillo-Mondéjar, RJ Rodríguez - Future Generation Computer Systems, 2025 - Elsevier
Vulnerabilities in unpatched applications can originate from third-party dependencies in
statically linked applications, as they must be relinked each time to take advantage of …

Analyzing and revivifying function signature inference using deep learning

Y Lin, T Singhal, D Gao, D Lo - Empirical Software Engineering, 2024 - Springer
Function signature plays an important role in binary analysis and security enhancement,
with typical examples in bug finding and control-flow integrity enforcement. However …

Peek: A Prune-Centric Approach for K Shortest Path Computation

W Feng, S Chen, H Liu, Y Ji - … of the International Conference for High …, 2023 - dl.acm.org
The K shortest path (KSP) algorithm, which finds the top K shortest simple paths from a
source to a target vertex, has a wide range of real-world applications, eg, routing …

Nestedgnn: Detecting malicious network activity with nested graph neural networks

Y Ji, HH Huang - ICC 2022-IEEE International Conference on …, 2022 - ieeexplore.ieee.org
Network attacks are dramatically increasing over the years. A graph can accurately model
the network activities. Therefore, graph-based techniques are frequently used to detect …

Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries

J Kim, D Genkin, K Leach - 2023 IEEE/ACM 31st International …, 2023 - ieeexplore.ieee.org
A binary's behavior is greatly influenced by how the compiler builds its source code.
Although most compiler configuration details are abstracted away during compilation …

Function-Level Compilation Provenance Identification with Multi-Faceted Neural Feature Distillation and Fusion

Y Gao, L Liang, Y Li, R Li, Y Wang - Electronics, 2024 - mdpi.com
In the landscape of software development, the selection of compilation tools and settings
plays a pivotal role in the creation of executable binaries. This diversity, while beneficial …