A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

A survey of binary code fingerprinting approaches: taxonomy, methodologies, and features

S Alrabaee, M Debbabi, L Wang - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Binary code fingerprinting is crucial in many security applications. Examples include
malware detection, software infringement, vulnerability analysis, and digital forensics. It is …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

αdiff: cross-version binary code similarity detection with dnn

B Liu, W Huo, C Zhang, W Li, F Li, A Piao… - Proceedings of the 33rd …, 2018 - dl.acm.org
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …

Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries

D Andriesse, X Chen, V Van Der Veen… - 25th USENIX security …, 2016 - usenix.org
It is well-known that static disassembly is an unsolved problem, but how much of a problem
is it in real software—for instance, for binary protection schemes? This work studies the …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arXiv preprint arXiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …

Avclass2: Massive malware tag extraction from av labels

S Sebastián, J Caballero - Proceedings of the 36th Annual Computer …, 2020 - dl.acm.org
Tags can be used by malware repositories and analysis services to enable searches for
samples of interest across different dimensions. Automatically extracting tags from AV labels …