咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 16 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 信息与通信工程
    • 1 篇 电气工程
  • 2 篇 理学
    • 2 篇 数学

主题

  • 18 篇 binary code simi...
  • 4 篇 cross-architectu...
  • 4 篇 reverse engineer...
  • 3 篇 graph neural net...
  • 3 篇 vulnerability de...
  • 3 篇 feature extracti...
  • 2 篇 program analysis
  • 2 篇 code comparison
  • 1 篇 scalability
  • 1 篇 software birthma...
  • 1 篇 code diffing
  • 1 篇 software plagiar...
  • 1 篇 intermediate rep...
  • 1 篇 code representat...
  • 1 篇 pseudo-siamese n...
  • 1 篇 building configu...
  • 1 篇 neural networks
  • 1 篇 graph auto-encod...
  • 1 篇 executable
  • 1 篇 optimization

机构

  • 2 篇 hong kong univ s...
  • 1 篇 shiga univ fac d...
  • 1 篇 lanzhou univ peo...
  • 1 篇 college of compu...
  • 1 篇 chinese acad sci...
  • 1 篇 beijing normal u...
  • 1 篇 natl univ comp &...
  • 1 篇 aalto univ dept ...
  • 1 篇 purdue univ w la...
  • 1 篇 zhejiang univ pe...
  • 1 篇 jinan univ coll ...
  • 1 篇 xi an jiao tong ...
  • 1 篇 huazhong univ sc...
  • 1 篇 state grid zheji...
  • 1 篇 concordia univ s...
  • 1 篇 southeast univ s...
  • 1 篇 xidian univ sch ...
  • 1 篇 thales res & tec...
  • 1 篇 beijing inst tec...
  • 1 篇 hydro quebec res...

作者

  • 2 篇 hu yikun
  • 2 篇 zhou qingguo
  • 2 篇 liu xin
  • 1 篇 lu zexin
  • 1 篇 he kaiyan
  • 1 篇 gu dawu
  • 1 篇 wang yin
  • 1 篇 lv bin
  • 1 篇 zhou anshunkang
  • 1 篇 zhou xiaokang
  • 1 篇 ma pingchuan
  • 1 篇 liu yue
  • 1 篇 qasem abdullah
  • 1 篇 han donggyun
  • 1 篇 hu ning
  • 1 篇 wang shuai
  • 1 篇 debbabi mourad
  • 1 篇 sun huihui
  • 1 篇 sun wenjie
  • 1 篇 sun hao

语言

  • 18 篇 英文
检索条件"主题词=Binary code similarity"
18 条 记 录,以下是1-10 订阅
排序:
binary code similarity Detection: State and Future  12
Binary Code Similarity Detection: State and Future
收藏 引用
12th International Conference on Cloud Networking (CloudNet)
作者: Li, Zhenshan Liu, Hao Shan, Ruijie Sun, Yanbin Jiang, Yu Hu, Ning Guangzhou Univ Cyberspace Initiate Adv Technol Guangzhou Peoples R China Beijing Normal Univ Hong Kong Baptist Univ United Int Coll Zhuhai Peoples R China
binary code similarity detection (BCSD) is an important research direction in the field of computer network security. The application scenarios for BCSD are widespread and many related methods have been proposed to so... 详细信息
来源: 评论
Unleashing the power of pseudo-code for binary code similarity analysis
收藏 引用
Cybersecurity 2023年 第2期6卷 44-61页
作者: Weiwei Zhang Zhengzi Xu Yang Xiao Yinxing Xue School of Computer Science and Engineering University of Science and Technology of ChinaHefeiChina School of Computer Science and Engineering Nanyang Technological UniversitySingaporeSingapore Institute of Information Engineering Chinese Academy of SciencesBeijingChina School of Cyber Security University of Chinese Academy of SciencesBeijingChina
code similarity analysis has become more popular due to its significant applicantions,including vulnerability detection,malware detection,and patch *** the source code of the software is difficult to obtain under most... 详细信息
来源: 评论
A Survey of binary code similarity
收藏 引用
ACM COMPUTING SURVEYS 2022年 第3期54卷 1–38页
作者: Ul Haq, Irfan Caballero, Juan Natl Univ Comp & Emerging Sci Islamabad Pakistan IMDEA Software Inst Madrid Spain
binary code similarityapproaches compare two or more pieces of binary code to identify their similarities and differences. The ability to compare binary code enables many real-world applications on scenarios where sou... 详细信息
来源: 评论
Multi-Level Cross-Architecture binary code similarity Metric
收藏 引用
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2021年 第9期46卷 8603-8615页
作者: Qiao, Meng Zhang, Xiaochuan Sun, Huihui Shan, Zheng Liu, Fudong Sun, Wenjie Li, Xingwei State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Peoples R China Natl Innovat Inst Def Technol Artificial Intelligence Res Ctr Beijing 100039 Peoples R China
Cross-architecture binary code similarity metric is a fundamental technique in many machine learning-based binary program analysis methods. Some researches recently utilize graph embedding methods to generate binary c... 详细信息
来源: 评论
Strtune: Data Dependence-Based code Slicing for binary similarity Detection With Fine-Tuned Representation
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2024年 19卷 10233-10245页
作者: He, Kaiyan Hu, Yikun Li, Xuehui Song, Yunhao Zhao, Yubo Gu, Dawu Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200025 Peoples R China
binary code similarity Detection (BCSD) is significant for software security as it can address binary tasks such as malicious code snippets identification and binary patch analysis by comparing code patterns. Recently... 详细信息
来源: 评论
Directed grey box fuzzy testing for power terminal device firmware with intermediate representation similarity comparison
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2025年 90卷
作者: Qin, Zhongyuan Chen, Jiaqi Sun, Xin Song, Yubo Dai, Hua Chen, Weiwei Lv, Bang Wang, Kanghui Southeast Univ Sch Cyber Sci & Engn Nanjing Peoples R China State Grid Zhejiang Elect Power Co Ltd Res Inst Hangzhou Peoples R China
The proliferation of heterogeneous devices in power IoT terminals significantly increases security risks due to firmware vulnerabilities, thereby threatening the stability and reliability of power systems. However, ex... 详细信息
来源: 评论
DVul-WLG: Graph Embedding Network Based on code similarity for Cross-Architecture Firmware Vulnerability Detection  24th
DVul-WLG: Graph Embedding Network Based on Code Similarity f...
收藏 引用
24rd International Conference on Information Security (ISC)
作者: Sun, Hao Tong, Yanjun Zhao, Jing Gu, Zhaoquan Dalian Univ Technol Dalian Peoples R China Guangzhou Univ Guangzhou Peoples R China
Vulnerabilities in the firmware of embedded devices have led to many IoT security incidents. Embedded devices have multiple architectures and the firmware source code of embedded devices is difficult to obtain, which ... 详细信息
来源: 评论
sem2vec: Semantics-aware Assembly Tracelet Embedding
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2023年 第4期32卷 1-34页
作者: Wang, Huaijin Ma, Pingchuan Wang, Shuai Tang, Qiyi Nie, Sen Wu, Shi Hong Kong Univ Sci & Technol Clear Water Bay Hong Kong Peoples R China Tencent Keen Secur Lab Tianlin Rd Shanghai Peoples R China
binary code similarity is the foundation of many security and software engineering applications. Recent works leverage deep neural networks (DNN) to learn a numeric vector representation (namely, embeddings) of assemb... 详细信息
来源: 评论
ARCTURUS: Full Coverage binary similarity Analysis with Reachability-guided Emulation
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第4期33卷 1-31页
作者: Zhou, Anshunkang Hu, Yikun Xu, Xiangzhe Zhang, Charles Hong Kong Univ Sci & Technol Clear Water Bay Hong Kong Peoples R China Shanghai Jiao Tong Univ Shanghai Peoples R China Purdue Univ W Lafayette IN USA
binary code similarity analysis is extremely useful, since it provides rich information about an unknown binary, such as revealing its functionality and identifying reused libraries. Robust binary similarity analysis ... 详细信息
来源: 评论
Novel supply chain vulnerability detection based on heterogeneous-graph-driven hash similarity in IoT
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2023年 148卷 201-210页
作者: Ye, Guodong Liu, Xin Fan, Siqi Tan, Yuan Zhou, Qingguo Zhou, Rui Zhou, Xiaokang Lanzhou Univ Sch Informat Sci & Engn Lanzhou 730000 Peoples R China Shiga Univ Fac Data Sci Hikone 5220069 Japan RIKEN Ctr Adv Intelligence Project Tokyo 3510198 Japan
Supply chain vulnerability (SCV) exists in third-party components (operating systems, basic libraries, etc.). These vulnerabilities do not exist in code written by ordinary developers, who unknowingly introduce them d... 详细信息
来源: 评论