咨询与建议

限定检索结果

文献类型

  • 9 篇 会议
  • 8 篇 期刊文献

馆藏范围

  • 17 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 17 篇 工学
    • 12 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 3 篇 信息与通信工程
    • 3 篇 软件工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 公共管理

主题

  • 17 篇 binary program a...
  • 7 篇 reverse engineer...
  • 5 篇 digital forensic...
  • 3 篇 malware forensic...
  • 2 篇 programming anal...
  • 2 篇 software composi...
  • 2 篇 static analysis
  • 2 篇 vulnerability di...
  • 2 篇 compiler provena...
  • 2 篇 function identif...
  • 1 篇 ethical hacking
  • 1 篇 target program a...
  • 1 篇 emulators
  • 1 篇 penetration test...
  • 1 篇 software module ...
  • 1 篇 control flow gra...
  • 1 篇 code protection
  • 1 篇 operating system...
  • 1 篇 instruments
  • 1 篇 component

机构

  • 4 篇 concordia univ c...
  • 1 篇 kyungnam univ de...
  • 1 篇 psl univ univ pa...
  • 1 篇 univ southern ca...
  • 1 篇 catarc intellige...
  • 1 篇 univ southern ca...
  • 1 篇 budapest univ te...
  • 1 篇 arizona state un...
  • 1 篇 dga ca 90046 usa
  • 1 篇 natl univ def te...
  • 1 篇 univ calif santa...
  • 1 篇 automot data chi...
  • 1 篇 information scie...
  • 1 篇 shanghai jiao to...
  • 1 篇 quarkslab sa 13 ...
  • 1 篇 shanghai jiao to...
  • 1 篇 univ paris 1 pan...
  • 1 篇 state key lab ma...
  • 1 篇 concordia univ c...

作者

  • 5 篇 debbabi mourad
  • 5 篇 wang lingyu
  • 4 篇 shirani paria
  • 3 篇 alrabaee saed
  • 2 篇 rahimian ashkan
  • 2 篇 gu dawu
  • 2 篇 hauser christoph...
  • 2 篇 hu yikun
  • 2 篇 zhang yuanyuan
  • 2 篇 alrbaee saed
  • 1 篇 mirkovic jelena
  • 1 篇 zhang yanan
  • 1 篇 wang ruoyu
  • 1 篇 aram galstyan
  • 1 篇 zahabizadeh spen...
  • 1 篇 feng chao
  • 1 篇 buttyan levente
  • 1 篇 ma chao
  • 1 篇 menon jayakrishn...
  • 1 篇 shoshitaishvili ...

语言

  • 14 篇 英文
  • 3 篇 其他
检索条件"主题词=binary program analysis"
17 条 记 录,以下是1-10 订阅
Empirical Study of Software Composition analysis Tools for C/C plus plus binary programs
收藏 引用
IEEE ACCESS 2024年 12卷 50418-50430页
作者: Ning, Yuqiao Zhang, Yanan Ma, Chao Guo, Zhen Yu, Longhai CATARC Intelligent & Connected Technol Co Ltd Guangzhou Peoples R China Automot Data China Tianjin Co Ltd Tianjin 300162 Peoples R China
Software composition analysis (SCA) is essential for understanding and optimizing complex C programs, ensuring system reliability and efficiency. Analyzing programs at the binary level provides insights into behavior,... 详细信息
来源: 评论
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-of-Service Vulnerabilities in binary Executables  22
Harm-DoS: Hash Algorithm Replacement for Mitigating Denial-o...
收藏 引用
25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID)
作者: Weideman, Nicolaas Wang, Haoda Kann, Tyler Zahabizadeh, Spencer Wu, Wei-Cheng Tandon, Rajat Mirkovic, Jelena Hauser, Christophe Univ Southern Calif Informat Sci Inst Marina Del Rey CA 90292 USA
programs and services relying on weak hash algorithms as part of their hash table implementations are vulnerable to hash-collision denial-of-service attacks. In the context of such an attack, the attacker sends a seri... 详细信息
来源: 评论
Bin2vec:learning representations of binary executable programs for security tasks
收藏 引用
Cybersecurity 2021年 第1期4卷 401-414页
作者: Shushan Arakelyan Sima Arasteh Christophe Hauser Erik Kline Aram Galstyan Information Sciences Institute 4676 Admiralty WayMarina Del ReyCAUSA
Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics,a tedious and time consuming task for human *** order to improve automation and scalability,we propose an alte... 详细信息
来源: 评论
binary Diffing as a Network Alignment Problem via Belief Propagation  36
Binary Diffing as a Network Alignment Problem via Belief Pro...
收藏 引用
36th IEEE/ACM International Conference on Automated Software Engineering (ASE)
作者: Mengin, Elie Rossi, Fabrice Univ Paris 1 Pantheon Sorbonne SAMM EA 4543 Paris France Quarkslab SA 13 Rue St Ambroise Paris France PSL Univ Univ Paris Dauphine CEREMADE CNRSUMR 7534 Paris France
In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing We introduce a new formulati... 详细信息
来源: 评论
DeMal: Module decomposition of malware based on community discovery
收藏 引用
COMPUTERS & SECURITY 2022年 117卷 1页
作者: Huang, Yuyao Shu, Hui Kang, Fei State Key Lab Math Engn & Adv Comp Zhengzhou 450000 Peoples R China
In recent years, malware has grown faster than ever in volume, form and harmfulness. While existing static or dynamic analysis techniques can meet the common user needs for malware detection, ana -lysts desire a more ... 详细信息
来源: 评论
Automatically Patching Vulnerabilities of binary programs via Code Transfer From Correct Versions
收藏 引用
IEEE ACCESS 2019年 7卷 28170-28184页
作者: Hu, Yikun Zhang, Yuanyuan Gu, Dawu Shanghai Jiao Tong Univ Sch Elect Informat & Elect Engn Shanghai 200240 Peoples R China
The security of binary programs is significantly threatened by software vulnerabilities. When vulnerabilities are found, those applications are exposed to malicious attacks that exploit the known vulnerabilities. Thus... 详细信息
来源: 评论
Sleak: Automating Address Space Layout Derandomization  19
Sleak: Automating Address Space Layout Derandomization
收藏 引用
35th Annual Computer Security Applications Conference (ACSA)
作者: Hauser, Christophe Menon, Jayakrishna Shoshitaishvili, Yan Wang, Ruoyu Vigna, Giovanni Kruegel, Christopher Univ Southern Calif Informat Sci Inst Los Angeles CA 90007 USA Arizona State Univ Tempe AZ 85287 USA Univ Calif Santa Barbara Santa Barbara CA 93106 USA
We present a novel approach to automatically recover information about the address space layout of remote processes in the presence of Address Space Layout Randomization (ASLR). Our system, dubbed Sleak, performs stat... 详细信息
来源: 评论
IoT Hacking - A Primer
INFOCOMMUNICATIONS JOURNAL
收藏 引用
INFOCOMMUNICATIONS JOURNAL 2019年 第2期11卷 2-13页
作者: Papp, Dorottya Tamas, Kristof Buttyan, Levente Budapest Univ Technol & Econ Dept Networked Syst & Serv CrySyS Lab Budapest Hungary
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that the... 详细信息
来源: 评论
A Static taint Detection Method for Stack Overflow Vulnerabilities in binaries  4
A Static taint Detection Method for Stack Overflow Vulnerabi...
收藏 引用
4th International Conference on Information Science and Control Engineering (ICISCE)
作者: Feng, Chao Zhang, Xing Natl Univ Def Technol Coll Elect Sci & Technol Sci Changsha Hunan Peoples R China
The current static analysis approaches for detecting stack overflow vulnerabilities in binaries are only usable to the functions in system libraries and not suitable for user defined functions. In this paper, we model... 详细信息
来源: 评论
binary Code Clone Detection across Architectures and Compiling Configurations  25
Binary Code Clone Detection across Architectures and Compili...
收藏 引用
25th IEEE/ACM International Conference on program Comprehension (ICPC)
作者: Hu, Yikun Zhang, Yuanyuan Li, Juanru Gu, Dawu Shanghai Jiao Tong Univ Shanghai Peoples R China
binary code clone detection (or similarity comparison) is a fundamental technique for many important applications, such as plagiarism detection, malware analysis, software vulnerability assessment and program comprehe... 详细信息
来源: 评论