咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是21-30 订阅
排序:
TraceFilter: An Exploitability Analyzer of Vulnerabilities in binary code  17
TraceFilter: An Exploitability Analyzer of Vulnerabilities i...
收藏 引用
IEEE 17th Int Conf on Dependable, Autonom and Secure Comp / IEEE 17th Int Conf on Pervas Intelligence and Comp / IEEE 5th Int Conf on Cloud and Big Data Comp / IEEE 4th Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech)
作者: Mok, Seong-Kyun cho, Eun-Sun Chungnam Natl Univ Dept Comp Sci & Engn Daejeon South Korea
Although the exploitation of vulnerabilities is a common method of attack, it is not always possible for program developers to eliminate all vulnerabilities before deployment. Fortunately, critical security behaviors ... 详细信息
来源: 评论
Guiding Symbolic Execution with A-Star  21st
Guiding Symbolic Execution with A-Star
收藏 引用
21st International Workshop on Software Engineering and Formal Methods (SEFM)
作者: Pinto, Theo De Castro Rollet, Antoine Sutre, Gregoire Tobor, Ireneusz Univ Bordeaux LaBRI Bordeaux INP CNRSUMR 5800 F-33400 Talence France Serma Safety & Secur F-33600 Pessac France
Symbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically execute the program in order to find an executable path to a target instruction. For the analysis to be fully accura... 详细信息
来源: 评论
Multi-threaded On-the-Fly Model Generation of Malware with Hash Compaction  1
收藏 引用
18th International Conference on Formal Engineering Methods (ICFEM)
作者: Nguyen Minh Hai Quan Thanh Tho Le Duc Anh HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Tokyo Univ Agr & Technol Tokyo Japan
This paper introduces multi-threaded implementation of our binary code analyzer BE-PUM for malware. On-the-fly model generation by BE-PUM is combined with duplication detection and hash compaction method to minimize t... 详细信息
来源: 评论
An Empirical Study of SDK Credential Misuse in iOS Apps  25
An Empirical Study of SDK Credential Misuse in iOS Apps
收藏 引用
25th Asia-Pacific Software Engineering Conference (APSEC)
作者: Wen, Haohuang Li, Juanru Zhang, Yuanyuan Gu, Dawu South China Univ Technol Sch Software Engn Guangzhou Guangdong Peoples R China Shanghai Jiao Tong Univ Lab Cryptol & Comp Secur Shanghai Peoples R China
During the development of web-based mobile apps, third-party SDKs (Software Development Kit) are frequently used to facilitate the integration of certain functionality such as push notification and mobile payment. Unf... 详细信息
来源: 评论
Context-Sensitive Flow Graph and Projective Single Assignment Form for Resolving Context-Dependency of binary code  13
Context-Sensitive Flow Graph and Projective Single Assignmen...
收藏 引用
13th ACM SIGSAC Workshop on Programming Languages and analysis for Security (PLAS)
作者: Izumida, Tomonori Mori, Akira Hashimoto, Masatomo IIJ Res Lab Tokyo Japan Natl Inst Adv Ind Sci & Technol Tokyo Japan Chiba Inst Technol Narashino Chiba Japan
Program analysis on binary code is considered as difficult because one has to resolve destinations of indirect jumps. However, there is another difficulty of context-dependency that matters when one processes binary p... 详细信息
来源: 评论
ACUA: API Change and Usage Auditor  14
ACUA: API Change and Usage Auditor
收藏 引用
14th IEEE International Working Conference on Source code analysis and Manipulation (SCAM)
作者: Wu, Wei Adams, Bram Gueheneuc, Yann-Gael Antoniol, Giuliano Ecole Polytech DGIGL Montreal PQ H3C 3A7 Canada
Modern software uses frameworks through their Application Programming Interfaces (APIs). Framework APIs may change while frameworks evolve. Client programs have to upgrade to new releases of frameworks if security vul... 详细信息
来源: 评论
Packer identification based on metadata signature  7
Packer identification based on metadata signature
收藏 引用
7th Software Security, Protection, and Reverse Engineering Workshop (SSPREW)
作者: Nguyen Minh Hai Ogawa, Mizuhito Quan Thanh Tho HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Japan Adv Inst Sci & Technol Nomi Ishikawa Japan
Malware applies lots of obfuscation techniques, which are often automatically generated by the use of packers. This paper presents a packer identification of packed code based on metadata signature, which is a frequen... 详细信息
来源: 评论
Are We There Yet? Filling the Gap Between binary Similarity analysis and binary Software Composition analysis  9
Are We There Yet? Filling the Gap Between Binary Similarity ...
收藏 引用
9th IEEE European Symposium on Security and Privacy (EuroS and P)
作者: Wang, Huaijin Liu, Zhibo Wang, Shuai Wang, Ying Tang, Qiyi Nie, Sen Wu, Shi Hong Kong Univ Sci & Technol Hong Kong Peoples R China Northeastern Univ Shenyang Peoples R China Tencent Keen Secur Lab Shenzhen Peoples R China
Software composition analysis (SCA) has attracted the attention of the industry and academic community in recent years. Given a piece of program source code, SCA facilitates extracting certain components from the inpu... 详细信息
来源: 评论
binary level toolchain provenance identification with graph neural networks  28
Binary level toolchain provenance identification with graph ...
收藏 引用
28th IEEE International Conference on Software analysis, Evolution and Reengineering (SANER)
作者: Benoit, Tristan Marion, Jean-Yves Bardin, Sebastien Univ Lorraine CNRS LORIA F-54000 Nancy France Univ Paris Saclay CEA LIST Saclay France
We consider the problem of recovering the compiling chain used to generate a given stripped binary code. We present a Graph Neural Network framework at the binary level to solve this problem, with the idea to take int... 详细信息
来源: 评论
Deductive binary code Verification Against Source-code-Level Specifications  14th
Deductive Binary Code Verification Against Source-Code-Level...
收藏 引用
14th International Conference on Tests and Proofs (TAP) held as part of Software Technologies - Applications and Foundations (STAF) Conference
作者: Kamkin, Alexander Khoroshilov, Alexey Kotsynyak, Artem Putro, Pavel Russian Acad Sci Ivannikov Inst Syst Programming Moscow Russia Lomonosov Moscow State Univ Moscow Russia Moscow Inst Phys & Technol Moscow Russia Natl Res Univ Higher Sch Econ Moscow Russia
There is a high demand in practical methods and tools to ensure total correctness of critical software components. A usual assumption is that the machine code (or binary code) generated by a compiler follows the seman... 详细信息
来源: 评论