咨询与建议

限定检索结果

文献类型

  • 27 篇 会议
  • 18 篇 期刊文献
  • 2 篇 学位论文

馆藏范围

  • 47 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 43 篇 工学
    • 37 篇 计算机科学与技术...
    • 17 篇 软件工程
    • 11 篇 电气工程
    • 6 篇 信息与通信工程
    • 2 篇 控制科学与工程
    • 1 篇 材料科学与工程(可...
  • 1 篇 理学
    • 1 篇 数学
  • 1 篇 农学
    • 1 篇 水产
  • 1 篇 管理学
    • 1 篇 公共管理

主题

  • 47 篇 binary code anal...
  • 6 篇 reverse engineer...
  • 5 篇 malware
  • 4 篇 vulnerability de...
  • 3 篇 concolic testing
  • 3 篇 static analysis
  • 3 篇 software securit...
  • 3 篇 symbolic executi...
  • 3 篇 security
  • 3 篇 malware detectio...
  • 2 篇 deep learning
  • 2 篇 belief propagati...
  • 2 篇 software metric
  • 2 篇 binary codes
  • 2 篇 machine learning
  • 2 篇 graph matching
  • 2 篇 malware analysis
  • 2 篇 network alignmen...
  • 2 篇 firmware analysi...
  • 2 篇 dynamic analysis

机构

  • 3 篇 hochiminh city u...
  • 2 篇 univ paris sacla...
  • 2 篇 concordia univ 1...
  • 2 篇 lomonosov moscow...
  • 2 篇 russian acad sci...
  • 2 篇 pennstate univer...
  • 1 篇 natl res univ hi...
  • 1 篇 samm ea 4543 uni...
  • 1 篇 russian acad sci...
  • 1 篇 russian armenian...
  • 1 篇 hochiminh city u...
  • 1 篇 south china univ...
  • 1 篇 inst rech hydro ...
  • 1 篇 univ paris 09 ps...
  • 1 篇 univ texas san a...
  • 1 篇 taiwan police co...
  • 1 篇 max planck inst ...
  • 1 篇 united arab emir...
  • 1 篇 tokyo univ agr &...
  • 1 篇 univ paris est l...

作者

  • 4 篇 debbabi mourad
  • 4 篇 nguyen minh hai
  • 4 篇 quan thanh tho
  • 4 篇 wang lingyu
  • 4 篇 alrabaee saed
  • 3 篇 shirani paria
  • 3 篇 ogawa mizuhito
  • 2 篇 qiu jing
  • 2 篇 wang shuai
  • 2 篇 stojanovic sasa
  • 2 篇 lin zhiqiang
  • 2 篇 radivojevic zaha...
  • 2 篇 bardin sebastien
  • 2 篇 marion jean-yves
  • 2 篇 benoit tristan
  • 2 篇 cvetanovic milos
  • 1 篇 ye guixin
  • 1 篇 wu dinghao
  • 1 篇 song zirui
  • 1 篇 elie mengin

语言

  • 46 篇 英文
  • 1 篇 其他
检索条件"主题词=binary code analysis"
47 条 记 录,以下是41-50 订阅
排序:
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2022年 65卷
作者: Li, Xiao Chang, Yuanhai Ye, Guixin Gong, Xiaoqing Tang, Zhanyong Northwest Univ Sch Informat Sci & Technol Xian 710127 Peoples R China
The cryptographic techniques are commonly used in software protection against malicious re-engineering. How to efficiently detect encryption algorithms used in the software to determine if they meet protection require... 详细信息
来源: 评论
binary code traceability of multigranularity information fusion from the perspective of software genes
收藏 引用
COMPUTERS & SECURITY 2022年 114卷 102607-102607页
作者: Huang, Yizhao Qiao, Meng Liu, Fudong Li, Xingwei Gui, Hairen Zhang, Chunyan State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Peoples R China
binary code traceability aims to use the relevant characteristics of anonymous binary codes to identify concealed authors or teams and replace error-prone and time-consuming manual reverse engineering tasks with autom... 详细信息
来源: 评论
SELF: A method of searching for library functions in stripped binary code
收藏 引用
COMPUTERS & SECURITY 2021年 111卷 102473-102473页
作者: Liu, Xueqian Cao, Shoufeng Cao, Zhenzhong Gao, Qu Wan, Lin Wang, Fengyu Shandong Univ Sch Software Jinan Peoples R China Coordinat Ctr China Natl Comp Network Emergency Response Tech Team Beijing Peoples R China Qufu Normal Univ Sch Software Qufu Shandong Peoples R China Chinese Acad Sci Aerosp Informat Res Inst Beijing Peoples R China
During software development, numerous third-party library functions are often reused. Accurately recognizing library functions reused in software is of great significance for some security scenarios, such as the detec... 详细信息
来源: 评论
A Survey of binary code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
收藏 引用
ACM COMPUTING SURVEYS 2023年 第1期55卷 19-19页
作者: Alrabaee, Saed Debbabi, Mourad Wang, Lingyu United Arab Emirates Univ Coll IT Informat Syst & Secur Al Ain U Arab Emirates Concordia Univ Concordia Inst Informat Syst Montreal PQ Canada Concordia Univ 1455 Blvd Maisonneuve O Montreal PQ H3G 1M8 Canada
binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers... 详细信息
来源: 评论
Improved Algorithm for the Network Alignment Problem with Application to binary Diffing
收藏 引用
Procedia Computer Science 2021年 192卷 961-970页
作者: Elie Mengin Fabrice Rossi SAMM EA 4543 Université Paris 1 Panthéon-Sorbonne 75013 Paris CEREMADE CNRS UMR 7534 Université Paris-Dauphine PSL University 75016 Paris
In this paper, we present a novel algorithm to address the Network Alignment problem. It is inspired from a previous message passing framework of Bayati et al. [2] and includes several modifications designed to signif... 详细信息
来源: 评论
VYPER: Vulnerability detection in binary code
收藏 引用
SECURITY AND PRIVACY 2020年 第2期3卷
作者: Boudjema, El Habib Verlan, Sergey Mokdad, Lynda Faure, Christele Univ Paris Est LACL Creteil France Saferiver Dept R&D Montrouge France
This paper presents a method for exploitable vulnerabilities detection in binary code with almost no false positives. It is based on the concolic (a mix of concrete and symbolic) execution of software binary code and ... 详细信息
来源: 评论
Towards Cross-Architecture binary code Vulnerability Detection  23
Towards Cross-Architecture Binary Code Vulnerability Detecti...
收藏 引用
Proceedings of the 33rd Annual International Conference on Computer Science and Software Engineering
作者: Shirani Paria Bhatt Sagar Hailane Asmaa Jourdan Guy-Vincent University of Ottawa Ottawa Ontario Canada Toronto Metropolitan University Toronto Ontario Canada
Today’s Internet of Things (IoT) environments are heterogeneous as they are typically comprised of devices equipped with various CPU architectures and software platforms. Therefore, in defending IoT environments agai... 详细信息
来源: 评论