咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 13 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 16 篇 binary code simi...
  • 3 篇 vulnerability de...
  • 3 篇 contrastive lear...
  • 2 篇 graph neural net...
  • 2 篇 transformer
  • 2 篇 deep learning
  • 2 篇 computer archite...
  • 2 篇 binary codes
  • 2 篇 semantics
  • 2 篇 machine learning
  • 2 篇 neural machine t...
  • 1 篇 pre-fitering
  • 1 篇 sbert
  • 1 篇 machine translat...
  • 1 篇 control flow gra...
  • 1 篇 code representat...
  • 1 篇 task analysis
  • 1 篇 function semanti...
  • 1 篇 transformers
  • 1 篇 software enginee...

机构

  • 2 篇 harbin inst tech...
  • 2 篇 natl univ def te...
  • 1 篇 university of sc...
  • 1 篇 hefei univ techn...
  • 1 篇 inst informat se...
  • 1 篇 natl comp networ...
  • 1 篇 univ sci & techn...
  • 1 篇 zhengzhou univ p...
  • 1 篇 informat engn un...
  • 1 篇 university of so...
  • 1 篇 sungkyunkwan uni...
  • 1 篇 university of sc...
  • 1 篇 chinese academy ...
  • 1 篇 georgia inst tec...
  • 1 篇 acad mil sci peo...
  • 1 篇 univ chinese aca...
  • 1 篇 shanghai jiao to...
  • 1 篇 qi-anxin technol...
  • 1 篇 natl key lab sci...
  • 1 篇 natl police acad...

作者

  • 2 篇 jiang xunzhi
  • 2 篇 pan zulie
  • 2 篇 wang shen
  • 2 篇 liu li
  • 2 篇 dong chaopeng
  • 1 篇 huang cheng
  • 1 篇 ito norimitsu
  • 1 篇 sun runjin
  • 1 篇 luo zhengping
  • 1 篇 luo zhenhao
  • 1 篇 cheng yiran
  • 1 篇 pan zhisong
  • 1 篇 jinxue peng
  • 1 篇 zhang min
  • 1 篇 li yuwei
  • 1 篇 wei li
  • 1 篇 liu shengli
  • 1 篇 yu tingyue
  • 1 篇 wang pengfei
  • 1 篇 shaoyin cheng

语言

  • 16 篇 英文
检索条件"主题词=Binary Code Similarity Detection"
16 条 记 录,以下是11-20 订阅
排序:
ConFunc: Enhanced binary Function-Level Representation through Contrastive Learning  22
ConFunc: Enhanced Binary Function-Level Representation throu...
收藏 引用
IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) / BigDataSE Conference / CSE Conference / EUC Conference / ISCI Conference
作者: Li, Longfei Yin, Xiaokang Li, Xiao Zhu, Xiaoya Liu, Shengli Zhengzhou Univ Zhengzhou Peoples R China Informat Engn Univ Zhengzhou Peoples R China
binary code similarity detection (BCSD) has numerous applications, including malware detection, vulnerability search, plagiarism detection, and patch identification. Recent studies have demonstrated that with the rapi... 详细信息
来源: 评论
Security Attacks and Defenses in Cyber Systems: From an AI Perspective
Security Attacks and Defenses in Cyber Systems: From an AI P...
收藏 引用
作者: Luo, Zhengping University of South Florida
学位级别:Ph.D., Doctor of Philosophy
Security of real-world cyber systems has drawn a lot of attention in recent years, especially when machine learning techniques are widely deployed into different layers of cyber systems. With the technology of machine... 详细信息
来源: 评论
FlowEmbed: binary function embedding model based on relational control flow graph and byte sequence  29
FlowEmbed: Binary function embedding model based on relation...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wang, Yongpan Dong, Chaopeng Li, Siyuan Luo, Fucai Su, Renjie Song, Zhanwei Li, Hong Chinese Academy of Sciences Institute of Information Engineering China University of Chinese Academy of Sciences School of Cyber Security China State Grid Fujian Electric Power Company China
binary function embedding models are applicable to various downstream tasks within IoT device software systems and have demonstrated advantages in numerous binary analysis tasks, such as vulnerability (homologous) fun... 详细信息
来源: 评论
GraphMoCo: A graph momentum contrast model for large-scale binary function representation learning
收藏 引用
NEUROCOMPUTING 2024年 575卷
作者: Sun, Runjin Guo, Shize Guo, Jinhong Wei, Li Zhang, Xingyu Xi, Guo Pan, Zhisong Army Engn Univ PLA Nanjing 210007 Peoples R China Natl Comp Network & Informat Secur Management Ctr Beijing 100029 Peoples R China Shanghai Jiao Tong Univ Shanghai 200240 Peoples R China Acad Mil Sci Beijing 100091 Peoples R China Univ Sci & Technol Beijing Beijing 100083 Peoples R China
In the field of cybersecurity, the ability to compute similarity scores at the function level for binary code is of utmost importance. Considering that a single binary file may contain an extensive amount of functions... 详细信息
来源: 评论
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection
收藏 引用
COMPUTERS & SECURITY 2024年 145卷
作者: Jiang, Xunzhi Wang, Shen Gong, Yuxin Yu, Tingyue Liu, Li Yu, Xiangzhan Harbin Inst Technol Sch Cyberspace Sci Harbin 150000 Heilongjiang Peoples R China
binary vulnerability detection is a significant area of research in computer security. The existing methods for detecting binary vulnerabilities primarily rely on binary code similarity analysis, detecting vulnerabili... 详细信息
来源: 评论
FoC: Figure out the Cryptographic Functions in Stripped Binaries with LLMs
收藏 引用
ACM Transactions on Software Engineering and Methodology 1000年
作者: Xiuwei Shang Guoqiang Chen Shaoyin Cheng Shikai Guo Yanming Zhang Weiming Zhang Nenghai Yu University of Science and Technology of China Hefei China QI-ANXIN Technology Research Institute Beijing China University of Science and Technology of China Anhui Province Key Laboratory of Digital Security Hefei China Dalian Maritime University The Dalian Key Laboratory of Artificial Intelligence Dalian China
Analyzing the behavior of cryptographic functions in stripped binaries is a challenging but essential task, which is crucial in software security fields such as malware analysis and legacy code inspection. However, th... 详细信息
来源: 评论