Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X Jin, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arXiv preprint arXiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …

Binary code summarization: Benchmarking chatgpt/gpt-4 and other large language models

X Jin, J Larson, W Yang, Z Lin - arXiv preprint arXiv:2312.09601, 2023 - arxiv.org
Binary code summarization, while invaluable for understanding code semantics, is
challenging due to its labor-intensive nature. This study delves into the potential of large …

StateFormer: fine-grained type recovery from binaries using generative state modeling

K Pei, J Guan, M Broughton, Z Chen, S Yao… - Proceedings of the 29th …, 2021 - dl.acm.org
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …

" Get in Researchers; We're Measuring Reproducibility": A Reproducibility Study of Machine Learning Papers in Tier 1 Security Conferences

D Olszewski, A Lu, C Stillman, K Warren… - Proceedings of the …, 2023 - dl.acm.org
Reproducibility is crucial to the advancement of science; it strengthens confidence in
seemingly contradictory results and expands the boundaries of known discoveries …

Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis

H Wang, Z Liu, S Wang, Y Wang… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Software composition analysis (SCA) has attracted the attention of the industry and
academic community in recent years. Given a piece of program source code, SCA facilitates …

Learning approximate execution semantics from traces for binary function similarity

K Pei, Z Xuan, J Yang, S Jana… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Detecting semantically similar binary functions–a crucial capability with broad security
usages including vulnerability detection, malware analysis, and forensics–requires …

Hard-label black-box universal adversarial patch attack

G Tao, S An, S Cheng, G Shen, X Zhang - 32nd USENIX Security …, 2023 - usenix.org
Deep learning models are widely used in many applications. Despite their impressive
performance, the security aspect of these models has raised serious concerns. Universal …

CLAP: Learning transferable binary code representations with natural language supervision

H Wang, Z Gao, C Zhang, Z Sha, M Sun… - Proceedings of the 33rd …, 2024 - dl.acm.org
Binary code representation learning has shown significant performance in binary analysis
tasks. But existing solutions often have poor transferability, particularly in few-shot and zero …

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention

Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …