咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=Binary code analysis"
47 条 记 录,以下是1-10 订阅
排序:
binary code analysis
收藏 引用
COMPUTER 2013年 第8期46卷 60-68页
作者: Liu, Kaiping Tan, Hee Beng Kuan Chen, Xu Nanyang Technol Univ Temasek Labs Singapore 639798 Singapore Nanyang Technol Univ Sch Elect & Elect Engn Informat Engn Div Singapore 639798 Singapore Chinese Acad Sci Inst Comp Technol Beijing Peoples R China
Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code. However, these approaches currently require separate tools, forcing users to perform d... 详细信息
来源: 评论
On the Role of Pre-trained Embeddings in binary code analysis  19
On the Role of Pre-trained Embeddings in Binary Code Analysi...
收藏 引用
19th ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS)
作者: Maier, Alwin Weissberg, Felix Rieck, Konrad Max Planck Inst Solar Syst Res Gottingen Germany Tech Univ Berlin Berlin Germany BIFOLD Berlin Germany
Deep learning has enabled remarkable progress in binary code analysis. In particular, pre-trained embeddings of assembly code have become a gold standard for solving analysis tasks, such as measuring code similarity o... 详细信息
来源: 评论
FUNPROBE: Probing Functions from binary code through Probabilistic analysis  2023
FUNPROBE: Probing Functions from Binary Code through Probabi...
收藏 引用
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)
作者: Kim, Soomin Kim, Hyungseok Cha, Sang Kil Korea Adv Inst Sci & Technol SoftSec Lab Seoul South Korea
Current function identification techniques have been mostly focused on a specific set of binaries compiled for a specific CPU architecture. While recent deep-learning-based approaches theoretically can handle binaries... 详细信息
来源: 评论
Advanced Reverse Engineering Techniques for binary code Security Retrofitting and analysis
Advanced Reverse Engineering Techniques for Binary Code Secu...
收藏 引用
作者: Wang, Shuai PennState University Libraries
学位级别:Doctor of Philosophy
In software security, many techniques and applications depend on binary code reverse engineering, i.e., analyzing and retrofitting executables with the source code unavailable. Despite the fact that many security hard... 详细信息
来源: 评论
Identifying runtime libraries in statically linked linux binaries
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 164卷
作者: Carrillo-Mondejar, Javier Rodriguez, Ricardo J. Univ Zaragoza Dept Informat & Ingn Sistemas Zaragoza Spain Aragon Inst Engn Res I3A Aragon Spain
Vulnerabilities in unpatched applications can originate from third-party dependencies in statically linked applications, as they must be relinked each time to take advantage of libraries that have been updated to fix ... 详细信息
来源: 评论
GENES ISP: code analysis platform
GENES ISP: code analysis platform
收藏 引用
Ivannikov Ispras Open Conference (ISPRAS)
作者: Sargsyan, Sevak Vardanyan, Vahagn Aslanyan, Hayk Harutunyan, Mariam Mehrabyan, Matevos Sargsyan, Karen Hovahannisyan, Hripsime Movsisyan, Hovhannes Hakobyan, Jivan Kurmangaleev, Shamil Russian Armenian Slavon Univ Yerevan Armenia ISP RAS Moscow Russia
In this paper we present a novel code analysis platform referred as "GENESISP". Its aim is to collect vast database of open source software and apply several integrated analyses. This analysis allows to unde... 详细信息
来源: 评论
Compiler-provenance identification in obfuscated binaries using vision transformers
收藏 引用
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION 2024年 49卷
作者: Khan, Wasif Alrabaee, Saed Al-kfairy, Mousa Tang, Jie Choo, Kim-Kwang Raymond United Arab Emirates Univ Informat Syst Secur Al Ain 15551 U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Tsinghua Univ Dept Comp Sci Beijing Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA United Arab Emirates Univ Big Data Analyt Ctr Al Ain 15551 U Arab Emirates United Arab Emirates Univ Coll IT Cybersecur Res Grp Ctr Al Ain 15551 U Arab Emirates
Extracting compiler-provenance-related information (e.g., the source of a compiler, its version, its optimization settings, and compiler-related functions) is crucial for binary-analysis tasks such as function fingerp... 详细信息
来源: 评论
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
收藏 引用
ACM TRANSACTIONS ON PRIVACY AND SECURITY 2018年 第2期21卷 1–34页
作者: Alrabaee, Saed Shirani, Paria Wang, Lingyu Debbabi, Mourad Concordia Univ Secur Res Ctr CIISE Montreal PQ H3G 1M8 Canada
Identifying free open-source software (FOSS) packages on binaries when the source code is unavailable is important for many security applications, such as malware detection, software infringement, and digital forensic... 详细信息
来源: 评论
Return Instruction Classification in binary code Using Machine Learning
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2022年 第9期32卷 1419-1452页
作者: Qiu, Jing Geng, Xiaoxu Dong, Feng Zhejiang A&F Univ Hangzhou 311300 Peoples R China Harbin Univ Sci & Technol Harbin 1500010 Peoples R China
binary code analysis is vital in source code unavailable cases, such as malware analysis and software vulnerability mining. Its first step could be function identification. Most function identification methods are bas... 详细信息
来源: 评论
Approach for estimating similarity between procedures in differently compiled binaries
收藏 引用
INFORMATION AND SOFTWARE TECHNOLOGY 2015年 第Feb.期58卷 259-271页
作者: Stojanovic, Sasa Radivojevic, Zaharije Cvetanovic, Milos Univ Belgrade Sch Elect Engn Belgrade 11000 Serbia
Context: Detection of an unauthorized use of a software library is a clone detection problem that in case of commercial products has additional complexity due to the fact that only binary code is available. Objective:... 详细信息
来源: 评论