咨询与建议

限定检索结果

文献类型

  • 1 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 2 篇 软件工程
    • 1 篇 电气工程

主题

  • 2 篇 binary function ...
  • 1 篇 deep learning
  • 1 篇 control-flow gra...
  • 1 篇 static analysis
  • 1 篇 binary code sear...
  • 1 篇 binary code simi...
  • 1 篇 neural regressor
  • 1 篇 binary-function-...

机构

  • 1 篇 chinese academy ...
  • 1 篇 xiangtan univ sc...
  • 1 篇 univ massachuset...
  • 1 篇 university of ch...
  • 1 篇 hunan univ coll ...
  • 1 篇 xiangtan univ sc...
  • 1 篇 state grid fujia...

作者

  • 1 篇 liu yuling
  • 1 篇 song zhanwei
  • 1 篇 li hong
  • 1 篇 luo fucai
  • 1 篇 wang jie
  • 1 篇 wang yongpan
  • 1 篇 su renjie
  • 1 篇 li siyuan
  • 1 篇 zhang yun
  • 1 篇 cheng ge
  • 1 篇 dong chaopeng

语言

  • 2 篇 英文
检索条件"主题词=binary function embedding"
2 条 记 录,以下是1-10 订阅
FlowEmbed: binary function embedding model based on relational control flow graph and byte sequence  29
FlowEmbed: Binary function embedding model based on relation...
收藏 引用
29th IEEE International Conference on Parallel and Distributed Systems, ICPADS 2023
作者: Wang, Yongpan Dong, Chaopeng Li, Siyuan Luo, Fucai Su, Renjie Song, Zhanwei Li, Hong Chinese Academy of Sciences Institute of Information Engineering China University of Chinese Academy of Sciences School of Cyber Security China State Grid Fujian Electric Power Company China
binary function embedding models are applicable to various downstream tasks within IoT device software systems and have demonstrated advantages in numerous binary analysis tasks, such as vulnerability (homologous) fun... 详细信息
来源: 评论
Similarity Regression Of functions In Different Compiled Forms With Neural Attentions On Dual Control-Flow Graphs
收藏 引用
COMPUTER JOURNAL 2023年 第5期67卷 1710-1718页
作者: Zhang, Yun Liu, Yuling Cheng, Ge Wang, Jie Hunan Univ Coll Comp Sci & Elect Engn Changsha Peoples R China Xiangtan Univ Sch Comp Sci Xiangtan Peoples R China Xiangtan Univ Sch Cyberspace Sci Xiangtan Peoples R China Univ Massachusetts Richard Miner Sch Comp & Informat Sci Lowell MA USA
Detecting if two functions in different compiled forms are similar has a wide range of applications in software security. We present a method that leverages both semantic and structural features of functions, learned ... 详细信息
来源: 评论