咨询与建议

限定检索结果

文献类型

  • 28 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 48 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 48 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 47 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
48 条 记 录,以下是11-20 订阅
排序:
Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling
收藏 引用
IEEE ACCESS 2021年 9卷 49160-49175页
作者: Tian, Zhenzhou Huang, Yaqian Xie, Borun Chen, Yanping Chen, Lingwei Wu, Dinghao Xian Univ Posts & Telecommun Sch Comp Sci & Technol Xian 710121 Peoples R China Shaanxi Key Lab Network Data Anal & Intelligent P Xian 710121 Peoples R China Penn State Univ Coll Informat Sci & Technol University Pk PA 16802 USA
Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details facilitate essential binary analysis tasks, such as malware an... 详细信息
来源: 评论
GENES ISP: code analysis platform
GENES ISP: code analysis platform
收藏 引用
Ivannikov Ispras Open Conference (ISPRAS)
作者: Sargsyan, Sevak Vardanyan, Vahagn Aslanyan, Hayk Harutunyan, Mariam Mehrabyan, Matevos Sargsyan, Karen Hovahannisyan, Hripsime Movsisyan, Hovhannes Hakobyan, Jivan Kurmangaleev, Shamil Russian Armenian Slavon Univ Yerevan Armenia ISP RAS Moscow Russia
In this paper we present a novel code analysis platform referred as "GENESISP". Its aim is to collect vast database of open source software and apply several integrated analyses. This analysis allows to unde... 详细信息
来源: 评论
A Survey of binary code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
收藏 引用
ACM COMPUTING SURVEYS 2023年 第1期55卷 19-19页
作者: Alrabaee, Saed Debbabi, Mourad Wang, Lingyu United Arab Emirates Univ Coll IT Informat Syst & Secur Al Ain U Arab Emirates Concordia Univ Concordia Inst Informat Syst Montreal PQ Canada Concordia Univ 1455 Blvd Maisonneuve O Montreal PQ H3G 1M8 Canada
binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers... 详细信息
来源: 评论
Padding Matters - Exploring Function Detection in PE Files: Data/Toolset paper  25
Padding Matters - Exploring Function Detection in PE Files: ...
收藏 引用
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy
作者: Raphael Springer Alexander Schmitz Artur Leinweber Tobias Urban Christian Dietrich Institute for Internet Security Westphalian University of Applied Sciences Gelsenkirchen Germany
Function detection is a well-known problem in binary analysis. While prior work has focused on Linux/ELF, Windows/PE binaries have only partially been considered. This paper introduces FuncPEval, a dataset for Windows... 详细信息
来源: 评论
Advanced Reverse Engineering Techniques for binary code Security Retrofitting and analysis
Advanced Reverse Engineering Techniques for Binary Code Secu...
收藏 引用
作者: Wang, Shuai PennState University Libraries
学位级别:Doctor of Philosophy
In software security, many techniques and applications depend on binary code reverse engineering, i.e., analyzing and retrofitting executables with the source code unavailable. Despite the fact that many security hard... 详细信息
来源: 评论
Accurate and Robust Malware analysis through Similarity of External Calls Dependency Graphs (ECDG)  21
Accurate and Robust Malware Analysis through Similarity of E...
收藏 引用
16th International Conference on Availability, Reliability and Security (ARES)
作者: Puodzius, Cassius Zendra, Olivier Heuser, Annelie Noureddine, Lamine INRIA Rennes France IRISA Rennes France
Malware is a primary concern in cybersecurity, being one of the attacker's favorite cyberweapons. Over time, malware evolves not only in complexity but also in diversity and quantity. Malware analysis automation i... 详细信息
来源: 评论
Improved Algorithm for the Network Alignment Problem with Application to binary Diffing  25
Improved Algorithm for the Network Alignment Problem with Ap...
收藏 引用
25th KES International Conference on Knowledge-Based and Intelligent Information & Engineering Systems (KES)
作者: Mengin, Elie Rossi, Fabrice Univ Paris 1 Pantheon Sorbonne SAMM EA 4543 F-75013 Paris France Quarkslab SA 13 Rue St Ambroise F-75011 Paris France Univ Paris 09 PSL Univ CNRS CEREMADEUMR 7534 F-75016 Paris France
In this paper, we present a novel algorithm to address the Network Alignment problem. It is inspired from a previous message passing framework of Bayati et al. [2] and includes several modifications designed to signif... 详细信息
来源: 评论
binary level toolchain provenance identification with graph neural networks  28
Binary level toolchain provenance identification with graph ...
收藏 引用
28th IEEE International Conference on Software analysis, Evolution and Reengineering (SANER)
作者: Benoit, Tristan Marion, Jean-Yves Bardin, Sebastien Univ Lorraine CNRS LORIA F-54000 Nancy France Univ Paris Saclay CEA LIST Saclay France
We consider the problem of recovering the compiling chain used to generate a given stripped binary code. We present a Graph Neural Network framework at the binary level to solve this problem, with the idea to take int... 详细信息
来源: 评论
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 65卷
作者: Li, Xiao Chang, Yuanhai Ye, Guixin Gong, Xiaoqing Tang, Zhanyong Northwest Univ Sch Informat Sci & Technol Xian 710127 Peoples R China
The cryptographic techniques are commonly used in software protection against malicious re-engineering. How to efficiently detect encryption algorithms used in the software to determine if they meet protection require... 详细信息
来源: 评论
binary code traceability of multigranularity information fusion from the perspective of software genes
收藏 引用
COMPUTERS & SECURITY 2022年 114卷 102607-102607页
作者: Huang, Yizhao Qiao, Meng Liu, Fudong Li, Xingwei Gui, Hairen Zhang, Chunyan State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Peoples R China
binary code traceability aims to use the relevant characteristics of anonymous binary codes to identify concealed authors or teams and replace error-prone and time-consuming manual reverse engineering tasks with autom... 详细信息
来源: 评论