咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是11-20 订阅
排序:
Comparison of binary Procedures: A Set of Techniques for Evading Compiler Transformations
收藏 引用
COMPUTER JOURNAL 2016年 第1期59卷 106-118页
作者: Radivojevic, Zaharije Cvetanovic, Milos Stojanovic, Sasa Univ Belgrade Sch Elect Engn Bulevar Kralja Aleksandra 73 Belgrade 11000 Serbia
License violation analysis may require digital forensics in the performance of a time-consuming search in order to find out whether a binary code of a product contains a procedure that originates from a source code fo... 详细信息
来源: 评论
CPA: Accurate Cross-Platform binary Authorship Characterization Using LDA
收藏 引用
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2020年 15卷 3051-3066页
作者: Alrabaee, Saed Debbabi, Mourad Wang, Lingyu United Arab Emirates Univ Informat Syst & Secur Dept Al Ain U Arab Emirates Concordia Univ CIISE Montreal PQ H3G 1M8 Canada
binary authorship characterization refers to the process of identifying stylistic characteristics that are related to the author of an anonymous binary code. The aim is to automate the laborious and error-prone revers... 详细信息
来源: 评论
Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling
收藏 引用
IEEE ACCESS 2021年 9卷 49160-49175页
作者: Tian, Zhenzhou Huang, Yaqian Xie, Borun Chen, Yanping Chen, Lingwei Wu, Dinghao Xian Univ Posts & Telecommun Sch Comp Sci & Technol Xian 710121 Peoples R China Shaanxi Key Lab Network Data Anal & Intelligent P Xian 710121 Peoples R China Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA
Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details facilitate essential binary analysis tasks, such as malware an... 详细信息
来源: 评论
Bin-Carver: Automatic recovery of binary executable files
收藏 引用
DIGITAL INVESTIGATION 2012年 9卷 S108-S117页
作者: Hand, Scott Lin, Zhiqiang Gu, Guofei Thuraisingham, Bhavani Univ Texas Dallas Dept Comp Sci Dallas TX 75230 USA Univ Texas Dallas Erik Jonsson Sch Engn & Comp Sci Dallas TX 75230 USA Texas A&M Univ Dept Comp Sci & Engn College Stn TX 77843 USA
File carving is the process of reassembling files from disk fragments based on the file content in the absence of file system metadata. By leveraging both file header and footer pairs, traditional file carving mainly ... 详细信息
来源: 评论
LIFTFUZZ: Validating binary Lifters through Context-aware Fuzzing with GPT  24
LIFTFUZZ: Validating Binary Lifters through Context-aware Fu...
收藏 引用
31st Conference on Computer and Communications Security
作者: Zhou, Yutong Yang, Fan Song, Zirui Zhang, Ke Chen, Jiongyi Zhang, Kehuan Chinese Univ Hong Kong Hong Kong Peoples R China
Analyzing binary code is vital for software engineering and security research, particularly when the source code is unavailable. However, understanding, modifying, and retargeting binary code can be complex tasks. To ... 详细信息
来源: 评论
Accurate and Robust Malware analysis through Similarity of External Calls Dependency Graphs (ECDG)  21
Accurate and Robust Malware Analysis through Similarity of E...
收藏 引用
16th International Conference on Availability, Reliability and Security (ARES)
作者: Puodzius, Cassius Zendra, Olivier Heuser, Annelie Noureddine, Lamine INRIA Rennes France IRISA Rennes France
Malware is a primary concern in cybersecurity, being one of the attacker's favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity and quantity. Malware analysis automation i... 详细信息
来源: 评论
Applying Convolutional Neural Network for Malware Detection  10
Applying Convolutional Neural Network for Malware Detection
收藏 引用
IEEE 10th International Conference on Awareness Science and Technology (iCAST)
作者: Chen, Chia-Mei Wang, Shi-Hao Wen, Dan-Wei Lai, Gu-Hsin Sun, Ming-Kung Natl Sun Yat Sen Univ Dept Informat Management Kaohsiung Taiwan Shu Zen Jr Coll Med & Management Dept Informat Management Kaohsiung Taiwan Guilin Univ Elect Technol Dept Finance & Accounting Guilin Peoples R China Taiwan Police Coll Dept Technol Crime Invest Taipei Taiwan Acer Cyber Secur Inc Taipei Taiwan
Failure to detect malware at its very inception leaves room for it to post significant threat and cost to cyber security for not only individuals, organizations but also the society and nation. However, the rapid grow... 详细信息
来源: 评论
Improved Algorithm for the Network Alignment Problem with Application to binary Diffing  25
Improved Algorithm for the Network Alignment Problem with Ap...
收藏 引用
25th KES International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES)
作者: Mengin, Elie Rossi, Fabrice Univ Paris 1 Pantheon Sorbonne SAMM EA 4543 F-75013 Paris France Quarkslab SA 13 Rue St Ambroise F-75011 Paris France Univ Paris 09 PSL Univ CNRS CEREMADEUMR 7534 F-75016 Paris France
In this paper, we present a novel algorithm to address the Network Alignment problem. It is inspired from a previous message passing framework of Bayati et al. [2] and includes several modifications designed to signif... 详细信息
来源: 评论
A MinHash Approach for Clustering Large Collections of binary Programs  20
A MinHash Approach for Clustering Large Collections of Binar...
收藏 引用
20th International Conference on System Controls and Computer Science 2015
作者: Oprisa, Ciprian Tech Univ Cluj Napoca Cluj Napoca Romania
Clustering large collections of binary programs is a challenging task due to two factors. First of all, a way to determine if two samples are similar or not is required. Secondly, pairwise comparison is impractical on... 详细信息
来源: 评论
Timing Performance Profiling of Substation Control code for IED Malware Detection  2017
Timing Performance Profiling of Substation Control Code for ...
收藏 引用
3rd Annual Industrial Control System Security Workshop (ICSS)
作者: Rrushi, Julian L. Western Washington Univ Dept Comp Sci Bellingham WA 98225 USA
We present a binary static analysis approach to detect intelligent electronic device (IED) malware based on the time requirements of electrical substations. We explore graph theory techniques to model the timing perfo... 详细信息
来源: 评论