咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 4 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 16 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 13 篇 计算机科学与技术...
    • 5 篇 电气工程
    • 4 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 生物学
    • 1 篇 数学
    • 1 篇 化学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 16 篇 binary code simi...
  • 3 篇 vulnerability de...
  • 3 篇 contrastive lear...
  • 2 篇 graph neural net...
  • 2 篇 transformer
  • 2 篇 deep learning
  • 2 篇 computer archite...
  • 2 篇 binary codes
  • 2 篇 semantics
  • 2 篇 machine learning
  • 2 篇 neural machine t...
  • 1 篇 pre-fitering
  • 1 篇 sbert
  • 1 篇 machine translat...
  • 1 篇 control flow gra...
  • 1 篇 code representat...
  • 1 篇 task analysis
  • 1 篇 function semanti...
  • 1 篇 transformers
  • 1 篇 software enginee...

机构

  • 2 篇 harbin inst tech...
  • 2 篇 natl univ def te...
  • 1 篇 university of sc...
  • 1 篇 hefei univ techn...
  • 1 篇 inst informat se...
  • 1 篇 natl comp networ...
  • 1 篇 univ sci & techn...
  • 1 篇 zhengzhou univ p...
  • 1 篇 informat engn un...
  • 1 篇 university of so...
  • 1 篇 sungkyunkwan uni...
  • 1 篇 university of sc...
  • 1 篇 chinese academy ...
  • 1 篇 georgia inst tec...
  • 1 篇 acad mil sci peo...
  • 1 篇 univ chinese aca...
  • 1 篇 shanghai jiao to...
  • 1 篇 qi-anxin technol...
  • 1 篇 natl key lab sci...
  • 1 篇 natl police acad...

作者

  • 2 篇 jiang xunzhi
  • 2 篇 pan zulie
  • 2 篇 wang shen
  • 2 篇 liu li
  • 2 篇 dong chaopeng
  • 1 篇 huang cheng
  • 1 篇 ito norimitsu
  • 1 篇 sun runjin
  • 1 篇 luo zhengping
  • 1 篇 luo zhenhao
  • 1 篇 cheng yiran
  • 1 篇 pan zhisong
  • 1 篇 jinxue peng
  • 1 篇 zhang min
  • 1 篇 li yuwei
  • 1 篇 wei li
  • 1 篇 liu shengli
  • 1 篇 yu tingyue
  • 1 篇 wang pengfei
  • 1 篇 shaoyin cheng

语言

  • 16 篇 英文
检索条件"主题词=binary code similarity detection"
16 条 记 录,以下是1-10 订阅
排序:
Fast Cross-Platform binary code similarity detection Framework Based on CFGs Taking Advantage of NLP and Inductive GNN
收藏 引用
Chinese Journal of Electronics 2024年 第1期33卷 128-138页
作者: Jinxue PENG Yong WANG Jingfeng XUE Zhenyan LIU School of Computer Science and Technology Beijing Institute of Technology
Cross-platform binary code similarity detection aims at detecting whether two or more pieces of binary code are similar or not. Existing approaches that combine control flow graphs(CFGs)-based function representation ... 详细信息
来源: 评论
Cross-platform binary code similarity detection based on NMT and graph embedding
收藏 引用
MATHEMATICAL BIOSCIENCES AND ENGINEERING 2021年 第4期18卷 4528-4551页
作者: Zhu, Xiaodong Jiang, Liehui Chen, Zeng State Key Lab Math Engn & Adv Comp Zhengzhou 450001 Peoples R China Natl Key Lab Sci & Technol Blind Signal Proc Chengdu 610000 Peoples R China
Cross-platform binary code similarity detection is determining whether a pair of binary functions coming from different platforms are similar, and plays an important role in many areas. Traditional methods focus on us... 详细信息
来源: 评论
A Lightweight Cross-Version binary code similarity detection Based on similarity and Correlation Coefficient Features
收藏 引用
IEEE ACCESS 2020年 8卷 120501-120512页
作者: Guo, Hui Huang, Shuguang Huang, Cheng Zhang, Min Pan, Zulie Shi, Fan Huang, Hui Hu, Donghui Wang, Xiaoping Natl Univ Def Technol Coll Elect Engn Hefei 230011 Peoples R China Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China Hefei Univ Technol Sch Comp Sci & Informat Engn Hefei 230009 Peoples R China
The technique of binary code similarity detection (BCSD) has been applied in many fields, such as malware detection, plagiarism detection and vulnerability search, etc. Existing solutions for the BCSD problem usually ... 详细信息
来源: 评论
Asteria-Pro: Enhancing Deep Learning-based binary code similarity detection by Incorporating Domain Knowledge
收藏 引用
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY 2024年 第1期33卷 1-40页
作者: Yang, Shouguo Dong, Chaopeng Xiao, Yang Cheng, Yiran Shi, Zhiqiang Li, Zhi Sun, Limin Chinese Acad Sci Inst Informat Engn 19 Shucun Rd Beijing 100085 Peoples R China Univ Chinese Acad Sci Sch Cyber Secur 1 Yanqihu East Rd Beijing 101408 Peoples R China
Widespread code reuse allows vulnerabilities to proliferate among a vast variety of firmware. There is an urgent need to detect these vulnerable codes effectively and efficiently. By measuring code similarities, AI-ba... 详细信息
来源: 评论
Feature Extraction Methods for binary code similarity detection Using Neural Machine Translation Models
收藏 引用
IEEE ACCESS 2023年 11卷 102796-102805页
作者: Ito, Norimitsu Hashimoto, Masaki Otsuka, Akira Natl Police Acad Police Info Commun Res Ctr Fuchu Tokyo 1838558 Japan Inst Informat Secur Yokohama Kanagawa 2210835 Japan
binary code similarity detection is an effective analysis technique for vulnerability, bug, and plagiarism detection in software for which the source code cannot be obtained. The recent proliferation of IoT devices ha... 详细信息
来源: 评论
Optir-SBERT: Cross-Architecture binary code similarity detection Based on Optimized LLVM IR  14th
Optir-SBERT: Cross-Architecture Binary Code Similarity Detec...
收藏 引用
14th EAI International Conference on Digital Forensics and Cyber Crime (ICDF2C)
作者: Yan, Yintong Yu, Lu Wang, Taiyan Li, Yuwei Pan, Zulie Natl Univ Def Technol Coll Elect Engn Hefei 230037 Peoples R China
Cross-architecture binary code similarity detection plays an important role in different security domains. In view of the low accuracy and poor scalability of existing cross-architecture detection technologies, we pro... 详细信息
来源: 评论
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version binary code similarity detection  24th
SimCGE: Simple Contrastive Learning of Graph Embeddings for ...
收藏 引用
24th International Conference on Information and Communications Security (ICICS)
作者: Xia, Fengliang Wu, Guixing Zhao, Guochao Li, Xiangyu Univ Sci & Technol China Hefei Peoples R China Univ Sci & Technol China Suzhou Inst Adv Res Suzhou Peoples R China
binary code similarity detection (BCSD) has many applications in computer security, whose task is to detect the similarity of two binary functions without having access to the source code. Recently deep learning metho... 详细信息
来源: 评论
IoTSim: Internet of Things-Oriented binary code similarity detection with Multiple Block Relations
收藏 引用
SENSORS 2023年 第18期23卷 7789-7789页
作者: Luo, Zhenhao Wang, Pengfei Xie, Wei Zhou, Xu Wang, Baosheng Natl Univ Def Technol Coll Comp Changsha 410073 Peoples R China
binary code similarity detection (BCSD) plays a crucial role in various computer security applications, including vulnerability detection, malware detection, and software component analysis. With the development of th... 详细信息
来源: 评论
UniBin: Assembly semantic-enhanced binary vulnerability detection without disassembly
收藏 引用
INFORMATION SCIENCES 2025年 691卷
作者: Liu, Li Wang, Shen Jiang, Xunzhi Harbin Inst Technol Sch Cyberspace Sci Harbin 150000 Heilongjiang Peoples R China
The widespread reuse of open-source code amplifies the impact of vulnerabilities. Current vulnerability detection methods predominantly rely on binary code similarity comparisons, which involve disassembling to obtain... 详细信息
来源: 评论
binary code Representation With Well-Balanced Instruction Normalization
收藏 引用
IEEE ACCESS 2023年 11卷 29183-29198页
作者: Koo, Hyungjoon Park, Soyeon Choi, Daejin Kim, Taesoo Sungkyunkwan Univ Dept Comp Sci & Engn Suwon 16419 South Korea Georgia Inst Technol Sch Comp Sci Atlanta GA 30332 USA Incheon Natl Univ Dept Comp Sci & Engn Incheon 22012 South Korea
The recovery of contextual meanings on a machine code is required by a wide range of binary analysis applications, such as bug discovery, malware analysis, and code clone detection. To accomplish this, advancements on... 详细信息
来源: 评论