Towards Cross-Architecture Binary Code Vulnerability Detection
Abstract
References
Index Terms
- Towards Cross-Architecture Binary Code Vulnerability Detection
Recommendations
Towards Practical Binary Code Similarity Detection: Vulnerability Verification via Patch Semantic Analysis
Vulnerability is a major threat to software security. It has been proven that binary code similarity detection approaches are efficient to search for recurring vulnerabilities introduced by code sharing in binary software. However, these approaches suffer ...
Learning-based Vulnerability Detection in Binary Code
ICMLC '22: Proceedings of the 2022 14th International Conference on Machine Learning and ComputingCyberattacks typically exploit software vulnerabilities to compromise computers and smart devices. To address vulnerabilities, many approaches have been developed to detect vulnerabilities using deep learning. However, most learning-based approaches ...
Recurrent Neural Network Based Binary Code Vulnerability Detection
ACAI '19: Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial IntelligenceVulnerability detection, especially vulnerability automatic detection, have long been an area of active research. Considering that RNN can model dependencies automatically, we propose a recurrent neural network (RNN) based method for binary code ...
Comments
Information & Contributors
Information
Published In
- Conference Chair:
- Iosif-Viorel (Vio) Onut,
- Editors:
- Paria Shirani,
- Iosif-Viorel (Vio) Onut,
- Program Co-chairs:
- Iosif-Viorel (Vio) Onut,
- Paula Branco
Publisher
IBM Corp.
United States
Publication History
Author Tags
Qualifiers
- Research-article
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 82Total Downloads
- Downloads (Last 12 months)65
- Downloads (Last 6 weeks)3
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in