咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是1-10 订阅
排序:
On the Role of Pre-trained Embeddings in binary code analysis  19
On the Role of Pre-trained Embeddings in Binary Code Analysi...
收藏 引用
19th ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS)
作者: Maier, Alwin Weissberg, Felix Rieck, Konrad Max Planck Inst Solar Syst Res Gottingen Germany Tech Univ Berlin Berlin Germany BIFOLD Berlin Germany
Deep learning has enabled remarkable progress in binary code analysis. In particular, pre-trained embeddings of assembly code have become a gold standard for solving analysis tasks, such as measuring code similarity o... 详细信息
来源: 评论
binary code analysis
收藏 引用
COMPUTER 2013年 第8期46卷 60-68页
作者: Liu, Kaiping Tan, Hee Beng Kuan Chen, Xu Nanyang Technol Univ Temasek Labs Singapore 639798 Singapore Nanyang Technol Univ Sch Elect & Elect Engn Informat Engn Div Singapore 639798 Singapore Chinese Acad Sci Inst Comp Technol Beijing Peoples R China
Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code. However, these approaches currently require separate tools, forcing users to perform d... 详细信息
来源: 评论
FUNPROBE: Probing Functions from binary code through Probabilistic analysis  2023
FUNPROBE: Probing Functions from Binary Code through Probabi...
收藏 引用
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)
作者: Kim, Soomin Kim, Hyungseok Cha, Sang Kil Korea Adv Inst Sci & Technol SoftSec Lab Seoul South Korea
Current function identification techniques have been mostly focused on a specific set of binaries compiled for a specific CPU architecture. While recent deep-learning-based approaches theoretically can handle binaries... 详细信息
来源: 评论
Identifying runtime libraries in statically linked linux binaries
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2025年 164卷
作者: Carrillo-Mondejar, Javier Rodriguez, Ricardo J. Univ Zaragoza Dept Informat & Ingn Sistemas Zaragoza Spain Aragon Inst Engn Res I3A Aragon Spain
Vulnerabilities in unpatched applications can originate from third-party dependencies in statically linked applications, as they must be relinked each time to take advantage of libraries that have been updated to fix ... 详细信息
来源: 评论
Compiler-provenance identification in obfuscated binaries using vision transformers
收藏 引用
FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION 2024年 49卷
作者: Khan, Wasif Alrabaee, Saed Al-kfairy, Mousa Tang, Jie Choo, Kim-Kwang Raymond United Arab Emirates Univ Informat Syst Secur Al Ain 15551 U Arab Emirates Zayed Univ Coll Technol Innovat Abu Dhabi U Arab Emirates Tsinghua Univ Dept Comp Sci Beijing Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA United Arab Emirates Univ Big Data Analyt Ctr Al Ain 15551 U Arab Emirates United Arab Emirates Univ Coll IT Cybersecur Res Grp Ctr Al Ain 15551 U Arab Emirates
Extracting compiler-provenance-related information (e.g., the source of a compiler, its version, its optimization settings, and compiler-related functions) is crucial for binary-analysis tasks such as function fingerp... 详细信息
来源: 评论
LIFTFUZZ: Validating binary Lifters through Context-aware Fuzzing with GPT  24
LIFTFUZZ: Validating Binary Lifters through Context-aware Fu...
收藏 引用
31st Conference on Computer and Communications Security
作者: Zhou, Yutong Yang, Fan Song, Zirui Zhang, Ke Chen, Jiongyi Zhang, Kehuan Chinese Univ Hong Kong Hong Kong Peoples R China
Analyzing binary code is vital for software engineering and security research, particularly when the source code is unavailable. However, understanding, modifying, and retargeting binary code can be complex tasks. To ... 详细信息
来源: 评论
Are We There Yet? Filling the Gap Between binary Similarity analysis and binary Software Composition analysis  9
Are We There Yet? Filling the Gap Between Binary Similarity ...
收藏 引用
9th IEEE European Symposium on Security and Privacy (EuroS and P)
作者: Wang, Huaijin Liu, Zhibo Wang, Shuai Wang, Ying Tang, Qiyi Nie, Sen Wu, Shi Hong Kong Univ Sci & Technol Hong Kong Peoples R China Northeastern Univ Shenyang Peoples R China Tencent Keen Secur Lab Shenzhen Peoples R China
Software composition analysis (SCA) has attracted the attention of the industry and academic community in recent years. Given a piece of program source code, SCA facilitates extracting certain components from the inpu... 详细信息
来源: 评论
Return Instruction Classification in binary code Using Machine Learning
收藏 引用
INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING 2022年 第9期32卷 1419-1452页
作者: Qiu, Jing Geng, Xiaoxu Dong, Feng Zhejiang A&F Univ Hangzhou 311300 Peoples R China Harbin Univ Sci & Technol Harbin 1500010 Peoples R China
binary code analysis is vital in source code unavailable cases, such as malware analysis and software vulnerability mining. Its first step could be function identification. Most function identification methods are bas... 详细信息
来源: 评论
Guiding Symbolic Execution with A-Star  21st
Guiding Symbolic Execution with A-Star
收藏 引用
21st International Workshop on Software Engineering and Formal Methods (SEFM)
作者: Pinto, Theo De Castro Rollet, Antoine Sutre, Gregoire Tobor, Ireneusz Univ Bordeaux LaBRI Bordeaux INP CNRSUMR 5800 F-33400 Talence France Serma Safety & Secur F-33600 Pessac France
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically execute the program in order to find an executable path to a target instruction. For the analysis to be fully accura... 详细信息
来源: 评论
Scalable Program Clone Search through Spectral analysis  2023
Scalable Program Clone Search through Spectral Analysis
收藏 引用
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)
作者: Benoit, Tristan Marion, Jean-Yves Bardin, Sebastien Univ Lorraine CNRS LORIA Nancy France Univ Paris Saclay CEA LIST Saclay France
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target ... 详细信息
来源: 评论