Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleOctober 2024
Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
CIKM '24: Proceedings of the 33rd ACM International Conference on Information and Knowledge ManagementPages 1215–1225https://doi.org/10.1145/3627673.3679726Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to source ...
- research-articleJuly 2024
Numerical Analysis of All-Optical Binary to Gray Code Converter Using Silicon Microring Resonator
Optical Memory and Neural Networks (SPOMNN), Volume 33, Issue 2Pages 193–204https://doi.org/10.3103/S1060992X24700085AbstractPresent manuscript designs and analyzes numerically all-optical binary-to-gray code (BTGC) converter utilizing silicon microring resonator. A waveguide-based silicon microring resonator has been employed to achieve optical switching under low-...
- research-articleFebruary 2024
Analysis of Decompiled Program Code Using Abstract Syntax Trees
Automatic Control and Computer Sciences (ACCS), Volume 57, Issue 8Pages 958–967https://doi.org/10.3103/S0146411623080060AbstractThis article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling ...
- research-articleMay 2023
Learning binary codes for fast image retrieval with sparse discriminant analysis and deep autoencoders
Image retrieval with relevant feedback on large and high-dimensional image databases is a challenging task. In this paper, we propose an image retrieval method, called BCFIR (Binary Codes for Fast Image Retrieval). BCFIR utilizes sparse discriminant ...
- research-articleJune 2022
Binary code similarity detection
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 1056–1060https://doi.org/10.1109/ASE51524.2021.9678518Binary code similarity detection is to detect the similarity of code at binary (assembly) level without source code. Existing work still has their limitation when dealing with mutated binary code with different compiling options. We proposed a novel ...
-
- research-articleJune 2021
BugGraph: Differentiating Source-Binary Code Similarity with Graph Triplet-Loss Network
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 702–715https://doi.org/10.1145/3433210.3437533Binary code similarity detection, which answers whether two pieces of binary code are similar, has been used in a number of applications,such as vulnerability detection and automatic patching. Existing approaches face two hurdles in their efforts to ...
- research-articleJanuary 2020
Facial expression recognition using local binary pattern and modified hidden Markov model
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 17, Issue 3-4Pages 367–378https://doi.org/10.1504/ijaip.2020.109523Facial expression is the non-verbal communication used to send and receive their inner emotions state. It plays a key role in person's behaviour and communication. Facial expression recognition can be applied in various areas like human-computer ...
- research-articleOctober 2018
Parallel Hashing Using Representative Points in Hyperoctants
CIKM '18: Proceedings of the 27th ACM International Conference on Information and Knowledge ManagementPages 813–822https://doi.org/10.1145/3269206.3271780The goal of hashing is to learn a low-dimensional binary representation of high-dimensional information, leading to a tremendous reduction of computational cost. Previous studies usually achieved this goal by applying projection or quantization methods. ...
- research-articleOctober 2018
Debin: Predicting Debug Information in Stripped Binaries
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 1667–1680https://doi.org/10.1145/3243734.3243866We present a novel approach for predicting debug information in stripped binaries. Using machine learning, we first train probabilistic models on thousands of non-stripped binaries and then use these models to predict properties of meaningful elements ...
- articleMay 2018
On the Representation of Results of Binary Code Reverse Engineering
Programming and Computing Software (KLU-PACS), Volume 44, Issue 3Pages 200–206https://doi.org/10.1134/S0361768818030064A representation of algorithms extracted from binary code by reverse engineering is discussed. Both intermediate representations designed for automatic analysis and final representations passed to the end user are considered. The two main tasks of ...
- ArticleOctober 2017
Towards robust instruction-level trace alignment of binary code
ASE '17: Proceedings of the 32nd IEEE/ACM International Conference on Automated Software EngineeringPages 342–352Program trace alignment is the process of establishing a correspondence between dynamic instruction instances in executions of two semantically similar but syntactically different programs. In this paper we present what is, to the best of our knowledge,...
- abstractOctober 2017
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 2633–2634https://doi.org/10.1145/3133956.3137052The Second Workshop on Forming an Ecosystem Around Software Transformation (FEAST 2017) is held in conjunction with the 24th ACM Conference on Computer and Communications Security (CCS 2017) on November 3, 2017 in Dallas, Texas. The workshop is geared ...
- research-articleOctober 2017
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPages 363–376https://doi.org/10.1145/3133956.3134018The problem of cross-platform binary code similarity detection aims at detecting whether two binary functions coming from different platforms are similar or not. It has many security applications, including plagiarism detection, malware detection, ...
- research-articleOctober 2017
Deep Asymmetric Pairwise Hashing
MM '17: Proceedings of the 25th ACM international conference on MultimediaPages 1522–1530https://doi.org/10.1145/3123266.3123345Recently, deep neural networks based hashing methods have greatly improved the multimedia retrieval performance by simultaneously learning feature representations and binary hash functions. Inspired by the latest advance in the asymmetric hashing scheme,...
- articleSeptember 2016
Application execution path analysis for the automatic parallelisation of binary codes in the Intel x86 platform
International Journal of Parallel, Emergent and Distributed Systems (IJPEDS), Volume 31, Issue 5Pages 405–419https://doi.org/10.1080/17445760.2015.1104681Traditionally, computer programs have been developed using the sequential programming paradigm. With the advent of parallel computing systems, such as multicore processors and distributed environments, the sequential paradigm became a barrier to the ...
- research-articleOctober 2015
Software Protection with Code Mobility
MTD '15: Proceedings of the Second ACM Workshop on Moving Target DefensePages 95–103https://doi.org/10.1145/2808475.2808481The analysis of binary code is a common step of Man-At-The-End attacks to identify code sections crucial to implement attacks, such as identifying private key hidden in the code, identifying sensitive algorithms or tamper with the code to disable ...
- short-paperJune 2015
Learning Binary Codes for Hashing via Feature Decomposition
ICMR '15: Proceedings of the 5th ACM on International Conference on Multimedia RetrievalPages 615–618https://doi.org/10.1145/2671188.2749397Binary code learning techniques have been actively studied for hashing based nearest neighbor search in recent years. However, most existing techniques directly map the data into a Hamming space, which ignores the inherent property that original ...
- posterNovember 2014
Salable Image Search with Reliable Binary Code
MM '14: Proceedings of the 22nd ACM international conference on MultimediaPages 769–772https://doi.org/10.1145/2647868.2654956In many existing image retrieval algorithms, Bag-of-Words (BoW) model has been widely adopted for image representation. To achieve accurate indexing and efficient retrieval, local features such as the SIFT descriptor are extracted and quantized to ...
- ArticleSeptember 2014
LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis
ARES '14: Proceedings of the 2014 Ninth International Conference on Availability, Reliability and SecurityPages 498–505https://doi.org/10.1109/ARES.2014.74Vulnerability analysis is an important component of software assurance practices. One of its most challenging issues is to find software flaws that could be exploited by malicious users. A necessary condition is the existence of some tainted information ...
- ArticleJune 2014
Distance Encoded Product Quantization
CVPR '14: Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern RecognitionPages 2139–2146https://doi.org/10.1109/CVPR.2014.274Many binary code embedding techniques have been proposed for large-scale approximate nearest neighbor search in computer vision. Recently, product quantization that encodes the cluster index in each subspace has been shown to provide impressive accuracy ...