咨询与建议

限定检索结果

文献类型

  • 4 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 5 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 5 篇 工学
    • 4 篇 计算机科学与技术...
    • 4 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 信息与通信工程

主题

  • 5 篇 binary code sear...
  • 2 篇 static analysis
  • 1 篇 tools
  • 1 篇 statistical simi...
  • 1 篇 binary clone det...
  • 1 篇 deep learning
  • 1 篇 partial trace
  • 1 篇 static binary an...
  • 1 篇 malware homology...
  • 1 篇 syntactics
  • 1 篇 binary codes
  • 1 篇 3d-cfg
  • 1 篇 cloning
  • 1 篇 semantics
  • 1 篇 binary function ...
  • 1 篇 feature extracti...
  • 1 篇 binary analysis
  • 1 篇 binary code simi...
  • 1 篇 simhash
  • 1 篇 binary similarit...

机构

  • 1 篇 waseda univ dept...
  • 1 篇 technion haifa
  • 1 篇 univ sci technol...
  • 1 篇 chinese academy ...
  • 1 篇 university of ch...
  • 1 篇 toshiba co ltd c...
  • 1 篇 nanyang technol ...
  • 1 篇 state grid fujia...
  • 1 篇 csg guangdong pr...

作者

  • 1 篇 tai zeming
  • 1 篇 yahav eran
  • 1 篇 liu yang
  • 1 篇 jiang yixin
  • 1 篇 song zhanwei
  • 1 篇 li hong
  • 1 篇 fujimatsu yurie
  • 1 篇 washizaki hirono...
  • 1 篇 luo fucai
  • 1 篇 fukazawa yoshiak...
  • 1 篇 xu zhengzi
  • 1 篇 wang yongpan
  • 1 篇 kanai jun
  • 1 篇 su renjie
  • 1 篇 li siyuan
  • 1 篇 chandramohan mah...
  • 1 篇 david yaniv
  • 1 篇 xue yinxing
  • 1 篇 zhang yunan
  • 1 篇 dong chaopeng

语言

  • 5 篇 英文
检索条件"主题词=binary code search"
5 条 记 录,以下是1-10 订阅
排序:
Accurate and Scalable Cross-Architecture Cross-OS binary code search with Emulation
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2019年 第11期45卷 1125-1149页
作者: Xue, Yinxing Xu, Zhengzi Chandramohan, Mahinthan Liu, Yang Univ Sci Technol China Hefei 230026 Anhui Peoples R China Nanyang Technol Univ Singapore 637553 Singapore
Different from source code clone detection, clone detection (similar code search) in binary executables faces big challenges due to the gigantic differences in the syntax and the structure of binary code that result f... 详细信息
来源: 评论
FlowEmbed: binary function embedding model based on relational control flow graph and byte sequence  29
FlowEmbed: Binary function embedding model based on relation...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wang, Yongpan Dong, Chaopeng Li, Siyuan Luo, Fucai Su, Renjie Song, Zhanwei Li, Hong Chinese Academy of Sciences Institute of Information Engineering China University of Chinese Academy of Sciences School of Cyber Security China State Grid Fujian Electric Power Company China
binary function embedding models are applicable to various downstream tasks within IoT device software systems and have demonstrated advantages in numerous binary analysis tasks, such as vulnerability (homologous) fun... 详细信息
来源: 评论
binary Similarity Analysis for Vulnerability Detection  44
Binary Similarity Analysis for Vulnerability Detection
收藏 引用
44th Annual IEEE-Computer-Society International Conference on Computers, Software, and Applications (COMPSAC)
作者: Tai, Zeming Washizaki, Hironori Fukazawa, Yoshiaki Fujimatsu, Yurie Kanai, Jun Waseda Univ Dept Comp Sci & Engn Tokyo Japan Toshiba Co Ltd Corp Res & Dev Ctr Tokyo Japan
binary similarity has been widely used in function recognition and vulnerability detection. How to define a proper similarity is the key element in implementing a fast detection method. We proposed a scalable method t... 详细信息
来源: 评论
Scalable and Accurate binary search Method based on Simhash and Partial Trace  19
Scalable and Accurate Binary Search Method based on Simhash ...
收藏 引用
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Zhang, Yunan Xu, Aidong Xu Jiang, Yixin CSG Guangdong Prov Key Lab Power Syst Network Secur Elect Power Res Inst Guangzhou Peoples R China
binary code search has received much attention recently due to its impactful applications, e.g., plagiarism detection, malware detection and software vulnerability auditing. However, developing an effective binary cod... 详细信息
来源: 评论
Similarity of Binaries through re-Optimization  2017
Similarity of Binaries through re-Optimization
收藏 引用
38th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)
作者: David, Yaniv Partush, Nimrod Yahav, Eran Technion Haifa Israel
We present a scalable approach for establishing similarity between stripped binaries (with no debug information). The main challenge in binary similarity, is to establish similarity even when the code has been compile... 详细信息
来源: 评论