Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleNovember 2024
A Review on Binary Code Analysis Datasets
Wireless Artificial Intelligent Computing Systems and ApplicationsPages 199–214https://doi.org/10.1007/978-3-031-71470-2_17AbstractBinary code analysis serves as the foundation for research in vulnerability discovery, software protection, and malicious code analysis. However, analyzing binary files is challenging due to the lack of high-level semantic information, leading to ...
- ArticleNovember 2023
Guiding Symbolic Execution with A-Star
AbstractSymbolic execution is widely used to detect vulnerabilities in software. The idea is to symbolically execute the program in order to find an executable path to a target instruction. For the analysis to be fully accurate, it must be performed on ...
- research-articleSeptember 2023
Towards Cross-Architecture Binary Code Vulnerability Detection
CASCON '23: Proceedings of the 33rd Annual International Conference on Computer Science and Software EngineeringPages 191–196Today’s Internet of Things (IoT) environments are heterogeneous as they are typically comprised of devices equipped with various CPU architectures and software platforms. Therefore, in defending IoT environments against security threats, the capability ...
- research-articleMarch 2022
GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program
Journal of Information Security and Applications (JISA), Volume 65, Issue Chttps://doi.org/10.1016/j.jisa.2021.103088AbstractThe cryptographic techniques are commonly used in software protection against malicious re-engineering. How to efficiently detect encryption algorithms used in the software to determine if they meet protection requirements is an ...
- research-articleMarch 2022
Binary code traceability of multigranularity information fusion from the perspective of software genes
AbstractBinary code traceability aims to use the relevant characteristics of anonymous binary codes to identify concealed authors or teams and replace error-prone and time-consuming manual reverse engineering tasks with automated systems. ...
- surveyJanuary 2022
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
ACM Computing Surveys (CSUR), Volume 55, Issue 1Article No.: 19, Pages 1–41https://doi.org/10.1145/3486860Binary code fingerprinting is crucial in many security applications. Examples include malware detection, software infringement, vulnerability analysis, and digital forensics. It is also useful for security researchers and reverse engineers since it ...
- research-articleDecember 2021
SELF: A method of searching for library functions in stripped binary code
Highlights- A novel scheme named SELF was proposed to recognize library functions used in stripped binary code. The key of SELF is combining the co-occurrence matrix and ...
During software development, numerous third-party library functions are often reused. Accurately recognizing library functions reused in software is of great significance for some security scenarios, such as the detection of known ...
- research-articleMarch 2021
Automatic Vulnerability Detection in Embedded Devices and Firmware: Survey and Layered Taxonomies
ACM Computing Surveys (CSUR), Volume 54, Issue 2Article No.: 25, Pages 1–42https://doi.org/10.1145/3432893In the era of the internet of things (IoT), software-enabled inter-connected devices are of paramount importance. The embedded systems are very frequently used in both security and privacy-sensitive applications. However, the underlying software (a.k.a. ...
- research-articleJanuary 2018
FOSSIL: A Resilient and Efficient System for Identifying FOSS Functions in Malware Binaries
ACM Transactions on Privacy and Security (TOPS), Volume 21, Issue 2Article No.: 8, Pages 1–34https://doi.org/10.1145/3175492Identifying free open-source software (FOSS) packages on binaries when the source code is unavailable is important for many security applications, such as malware detection, software infringement, and digital forensics. This capability enhances both the ...
- ArticleOctober 2012
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis
AbstractMalware often encrypts its malicious code and sensitive data to avoid static pattern detection, thus detecting encryption functions and extracting the encryption keys in a malware can be very useful in security analysis. However, it’s a ...