咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 公共管理

主题

  • 17 篇 binary program a...
  • 7 篇 reverse engineer...
  • 5 篇 digital forensic...
  • 3 篇 malware forensic...
  • 2 篇 programming anal...
  • 2 篇 software composi...
  • 2 篇 static analysis
  • 2 篇 vulnerability di...
  • 2 篇 compiler provena...
  • 2 篇 function identif...
  • 1 篇 ethical hacking
  • 1 篇 target program a...
  • 1 篇 emulators
  • 1 篇 penetration test...
  • 1 篇 software module ...
  • 1 篇 control flow gra...
  • 1 篇 code protection
  • 1 篇 operating system...
  • 1 篇 instruments
  • 1 篇 component

机构

  • 4 篇 concordia univ c...
  • 1 篇 kyungnam univ de...
  • 1 篇 psl univ univ pa...
  • 1 篇 univ southern ca...
  • 1 篇 catarc intellige...
  • 1 篇 univ southern ca...
  • 1 篇 budapest univ te...
  • 1 篇 arizona state un...
  • 1 篇 dga ca 90046 usa
  • 1 篇 natl univ def te...
  • 1 篇 univ calif santa...
  • 1 篇 automot data chi...
  • 1 篇 information scie...
  • 1 篇 shanghai jiao to...
  • 1 篇 quarkslab sa 13 ...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ paris 1 pan...
  • 1 篇 state key lab ma...
  • 1 篇 concordia univ c...

作者

  • 5 篇 debbabi mourad
  • 5 篇 wang lingyu
  • 4 篇 shirani paria
  • 3 篇 alrabaee saed
  • 2 篇 rahimian ashkan
  • 2 篇 gu dawu
  • 2 篇 hauser christoph...
  • 2 篇 hu yikun
  • 2 篇 zhang yuanyuan
  • 2 篇 alrbaee saed
  • 1 篇 mirkovic jelena
  • 1 篇 zhang yanan
  • 1 篇 wang ruoyu
  • 1 篇 aram galstyan
  • 1 篇 zahabizadeh spen...
  • 1 篇 feng chao
  • 1 篇 buttyan levente
  • 1 篇 ma chao
  • 1 篇 menon jayakrishn...
  • 1 篇 shoshitaishvili ...

语言

  • 14 篇 英文
  • 3 篇 其他
检索条件"主题词=Binary Program Analysis"
17 条 记 录,以下是1-10 订阅
排序:
BinComp: A stratified approach to compiler provenance Attribution
收藏 引用
DIGITAL INVESTIGATION 2015年 第S1期14卷 S146-S155页
作者: Rahimian, Ashkan Shirani, Paria Alrbaee, Saed Wang, Lingyu Debbabi, Mourad Concordia Univ Concordia Inst Informat Syst Engn Comp Secur Lab Montreal PQ Canada
Compiler provenance encompasses numerous pieces of information, such as the compiler family, compiler version, optimization level, and compiler-related functions. The extraction of such information is imperative for v... 详细信息
来源: 评论
Empirical Study of Software Composition analysis Tools for C/C plus plus binary programs
收藏 引用
IEEE ACCESS 2024年 12卷 50418-50430页
作者: Ning, Yuqiao Zhang, Yanan Ma, Chao Guo, Zhen Yu, Longhai CATARC Intelligent & Connected Technol Co Ltd Guangzhou Peoples R China Automot Data China Tianjin Co Ltd Tianjin 300162 Peoples R China
Software composition analysis (SCA) is essential for understanding and optimizing complex C programs, ensuring system reliability and efficiency. Analyzing programs at the binary level provides insights into behavior,... 详细信息
来源: 评论
OBA2: An Onion approach to binary code Authorship Attribution
收藏 引用
DIGITAL INVESTIGATION 2014年 第SUPPL. 1期11卷 S94-S103页
作者: Alrabaee, Saed Saleem, Noman Preda, Stere Wang, Lingyu Debbabi, Mourad Concordia Univ Comp Secur Lab Natl Cyber Forens & Training Alliance Canada Montreal PQ Canada
A critical aspect of malware forensics is authorship analysis. The successful outcome of such analysis is usually determined by the reverse engineer's skills and by the volume and complexity of the code under anal... 详细信息
来源: 评论
Bin2vec:learning representations of binary executable programs for security tasks
收藏 引用
Cybersecurity 2021年 第1期4卷 401-414页
作者: Shushan Arakelyan Sima Arasteh Christophe Hauser Erik Kline Aram Galstyan Information Sciences Institute 4676 Admiralty WayMarina Del ReyCAUSA
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human *** order to improve automation and scalability,we propose an alte... 详细信息
来源: 评论
Automatically Patching Vulnerabilities of binary programs via Code Transfer From Correct Versions
收藏 引用
IEEE ACCESS 2019年 7卷 28170-28184页
作者: Hu, Yikun Zhang, Yuanyuan Gu, Dawu Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China
The security of binary programs is significantly threatened by software vulnerabilities. When vulnerabilities are found, those applications are exposed to malicious attacks that exploit the known vulnerabilities. Thus... 详细信息
来源: 评论
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in binary Executables  22
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-o...
收藏 引用
25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
作者: Weideman, Nicolaas Wang, Haoda Kann, Tyler Zahabizadeh, Spencer Wu, Wei-Cheng Tandon, Rajat Mirkovic, Jelena Hauser, Christophe Univ Southern Calif Informat Sci Inst Marina Del Rey CA 90292 USA
programs and services relying on weak hash algorithms as part of their hash table implementations are vulnerable to hash-collision denial-of-service attacks. In the context of such an attack, the attacker sends a seri... 详细信息
来源: 评论
Malware Dynamic Recompilation
Malware Dynamic Recompilation
收藏 引用
47th Annual Hawaii International Conference on System Sciences
作者: Josse, Sebastien DGA Los Angeles CA 90046 USA
Malware are more and more difficult to analyze, using conventional static and dynamic analysis tools, because they use commercially off-the-shelf specialized tools to protect their code. We present in this paper the b... 详细信息
来源: 评论
binary Diffing as a Network Alignment Problem via Belief Propagation  36
Binary Diffing as a Network Alignment Problem via Belief Pro...
收藏 引用
36th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Mengin, Elie Rossi, Fabrice Univ Paris 1 Pantheon Sorbonne SAMM EA 4543 Paris France Quarkslab SA 13 Rue St Ambroise Paris France PSL Univ Univ Paris Dauphine CEREMADE CNRSUMR 7534 Paris France
In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing We introduce a new formulati... 详细信息
来源: 评论
Sleak: Automating Address Space Layout Derandomization  19
Sleak: Automating Address Space Layout Derandomization
收藏 引用
35th Annual Computer Security Applications Conference (ACSA)
作者: Hauser, Christophe Menon, Jayakrishna Shoshitaishvili, Yan Wang, Ruoyu Vigna, Giovanni Kruegel, Christopher Univ Southern Calif Informat Sci Inst Los Angeles CA 90007 USA Arizona State Univ Tempe AZ 85287 USA Univ Calif Santa Barbara Santa Barbara CA 93106 USA
We present a novel approach to automatically recover information about the address space layout of remote processes in the presence of Address Space Layout Randomization (ASLR). Our system, dubbed Sleak, performs stat... 详细信息
来源: 评论
A Static taint Detection Method for Stack Overflow Vulnerabilities in binaries  4
A Static taint Detection Method for Stack Overflow Vulnerabi...
收藏 引用
4th International Conference on Information Science and Control Engineering (ICISCE)
作者: Feng, Chao Zhang, Xing Natl Univ Def Technol Coll Elect Sci & Technol Sci Changsha Hunan Peoples R China
The current static analysis approaches for detecting stack overflow vulnerabilities in binaries are only usable to the functions in system libraries and not suitable for user defined functions. In this paper, we model... 详细信息
来源: 评论