咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是31-40 订阅
排序:
Library Functions Identification in binary code by Using Graph Isomorphism Testings  22
Library Functions Identification in Binary Code by Using Gra...
收藏 引用
22nd IEEE International Conference on Software analysis, Evolution, and Reengineering (SANER)
作者: Qiu, Jing Su, Xiaohong Ma, Peijun Harbin Inst Technol Sch Comp Sci & Technol Harbin Peoples R China
Library functions identification is a key technique in reverse engineering. Discontinuity and polymorphism of inline and optimized library functions in binary code create a difficult challenge for library functions id... 详细信息
来源: 评论
Obfuscation code Localization Based on CFG Generation of Malware  8th
Obfuscation Code Localization Based on CFG Generation of Mal...
收藏 引用
8th International Symposium on Foundations and Practice of Security (FPS)
作者: Nguyen Minh Hai Ogawa, Mizuhito Quan Thanh Tho Ho Chi Minh City Univ Technol Ho Chi Minh City Vietnam Japan Adv Inst Sci & Technol Nomi Japan
This paper presents a tool BE-PUM (binary Emulator for PUshdown Model generation), which generates a precise control flow graph (CFG), under presence of typical obfuscation techniques of malware, e.g., indirect jump, ... 详细信息
来源: 评论
Scalable Program Clone Search through Spectral analysis  2023
Scalable Program Clone Search through Spectral Analysis
收藏 引用
31st ACM Joint Meeting of the European Software Engineering Conference / Symposium on the Foundations-of-Software-Engineering (ESEC/FSE)
作者: Benoit, Tristan Marion, Jean-Yves Bardin, Sebastien Univ Lorraine CNRS LORIA Nancy France Univ Paris Saclay CEA LIST Saclay France
We consider the problem of program clone search, i.e. given a target program and a repository of known programs (all in executable format), the goal is to find the program in the repository most similar to the target ... 详细信息
来源: 评论
Opaque Predicate: Attack and Defense in Obfuscated binary code
Opaque Predicate: Attack and Defense in Obfuscated Binary Co...
收藏 引用
作者: Xu, Dongpeng PennState University Libraries
学位级别:Doctor of Philosophy
An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering ... 详细信息
来源: 评论
Recovery of high-level intermediate representations of algorithms from binary code
Recovery of high-level intermediate representations of algor...
收藏 引用
Ivannikov Memorial Workshop (IVMEM)
作者: Bugerya, Alexander Borisovich Kulagin, Ivan Ivanovich Padaryan, Vartan Andronikovich Solovev, Mikhail Aleksandrovich Tikhonov, Andrei Yur'evich Russian Acad Sci Keldysh Inst Appl Math Moscow Russia Russian Acad Sci Ivannikov Inst Syst Programming Moscow Russia Lomonosov Moscow State Univ Moscow Russia
One of the tasks of binary code security analysis is detection of undocumented features in software. This task is hard to automate, and it requires participation of a cybersecurity expert. The way of representation of... 详细信息
来源: 评论
ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable binary Files and Object code  20
ISAdetect: Usable Automated Detection of CPU Architecture an...
收藏 引用
10th ACM Conference on Data and Application Security and Privacy (CODASPY)
作者: Kairajarvi, Sami Costin, Andrei Hamalainen, Timo Univ Jyvaskyla Jyvaskyla Finland
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysi... 详细信息
来源: 评论
A Hybrid Aproach for Control Flow Graph Construction from binary code
A Hybrid Aproach for Control Flow Graph Construction from Bi...
收藏 引用
20th Asia-Pacific Software Engineering Conference (APSEC)
作者: Minh Hai Nguyen Thien Binh Nguyen Thanh Tho Quan Ogawa, Mizuhito Hochiminh City Univ Technol Fac Comp Sci & Engn Hochiminh City Vietnam Japan Adv Inst Sci & Technol Sch Informat Sci Nomi Ishikawa Japan
binary code analysis has attracted much attention The difficulty lies in constructing a Control Flow Graph (CFG), which is dynamically generated and modified, such as mutations. Typical examples are handling dynamic j... 详细信息
来源: 评论
Incremental Verification of ω-regions on binary Control Flow Graph for Computer Virus Detection
Incremental Verification of ω-regions on Binary Control Flo...
收藏 引用
3rd National-Foundation-for-Science-and-Technology-Development Conference on Information and Computer Science (NICS)
作者: Nguyen Thien Binh Quan Thanh Tho Ha Minh Ngoc Nguyen Minh Hai HoChiMinh City Univ Technol Ho Chi Minh City Vietnam Eastern Int Univ Tx Thu Dau Mot Binh Duong Vietnam
Generally, a computer virus, or virus, consists of two major parts, including a syntactic pattern of signature and code segment performing the core malicious actions. Currently, most of commercial security programs re... 详细信息
来源: 评论
Type Inference on Executables
收藏 引用
ACM COMPUTING SURVEYS 2016年 第4期48卷 65-65页
作者: Caballero, Juan Lin, Zhiqiang IMDEA Software Inst Madrid Spain Univ Texas Dallas Dept Comp Sci 800 W Campbell Rd Richardson TX 75080 USA
In many applications, source code and debugging symbols of a target program are not available, and the only thing that we can access is the program executable. A fundamental challenge with executables is that, during ... 详细信息
来源: 评论
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies
收藏 引用
ACM COMPUTING SURVEYS 2021年 第2期54卷 25-25页
作者: Qasem, Abdullah Shirani, Paria Debbabi, Mourad Wang, Lingyu Lebel, Bernard Agba, Basile L. Concordia Univ 1455 Blvd Maisonneuve O Montreal PQ H3G 1M8 Canada Thales Canada Inc 2800 Av Marie Curie Montreal PQ H4S 2C2 Canada Inst Rech Hydro Quebec 1800 Blvd Lionel Boulet Montreal PQ J3X 1S1 Canada
In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. Howe... 详细信息
来源: 评论