Výsledky vyhledávání - "binary analysis"
-
1
Autoři:
Zdroj: Tehnički glasnik. 19:560-574
Témata: LLM security, OWASP Top 10, software security, memory vulnerabilities, AI-generated code, static-dynamic analysis, binary analysis, encryption vulnerabilities
Popis souboru: application/pdf
Přístupová URL adresa: https://hrcak.srce.hr/335259
https://doi.org/10.31803/tg-20250225095135 -
2
Autoři: a další
Zdroj: 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P). :980-1001
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Adversarial machine learning, binary analysis, binary function similarity, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Přístupová URL adresa: http://arxiv.org/abs/2412.04163
https://hdl.handle.net/11573/1739397 -
3
Autoři:
Zdroj: 2025 IEEE Symposium on Security and Privacy (SP)
Témata: systems security, transient execution, hardware security, side channels, spectre, microarchitectural security, program and binary analysis
-
4
Autoři:
Zdroj: IEEE Access, Vol 13, Pp 4368-4380 (2025)
Témata: FOS: Computer and information sciences, software security, Computer Science - Cryptography and Security, Binary analysis, 68-04, post-quantum migration, Electrical engineering. Electronics. Nuclear engineering, Cryptography and Security (cs.CR), post-quantum cryptography, TK1-9971
Přístupová URL adresa: http://arxiv.org/abs/2409.07852
https://doaj.org/article/6fc954845233441989906dc8c389e53f -
5
Autoři:
Zdroj: Proceedings of the 19th International Conference on Availability, Reliability and Security. :1-7
Témata: Behaviour, Binary analysis, Certification, Detection, ELF file, IoT, IoT devices, IoT Firmware, Rust, Static analysis
Popis souboru: application/pdf
-
6
Autoři: a další
Přispěvatelé: a další
Zdroj: TRITA-EECS-AVL.
Témata: Formal verification, interactive theorem proving, HOL4, P4, binary analysis, semantics, program logic, symbolic execution, Formell verifiering, interaktiv teorembevisning, binäranalys, semantik, programlogik, symbolisk exekvering, Datalogi, Computer Science
Popis souboru: electronic
-
7
Autoři: a další
Zdroj: IEEE Access, Vol 12, Pp 161247-161269 (2024)
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, binary code models, Adversarial attacks, binary similarity, TK1-9971, Machine Learning (cs.LG), greedy, Electrical engineering. Electronics. Nuclear engineering, binary analysis, black-box attacks, Cryptography and Security (cs.CR), Adversarial Attacks, Binary Analysis, Binary Code Models, Binary Similarity, Black-box Attacks, Greedy, White-box Attacks
Popis souboru: application/pdf
-
8
Autoři: a další
Témata: binary analysis, neural networks, software security
Popis souboru: application/pdf
Přístupová URL adresa: https://hdl.handle.net/11573/1744930
-
9
Autoři: a další
Témata: Malware Analysis, Data Set Quality, Binary Analysis, Linux Malware, Machine Learning, Assembly Mnemonics
Popis souboru: application/pdf
Přístupová URL adresa: https://hdl.handle.net/11584/443966
-
10
Autoři: a další
Přispěvatelé: a další
Popis souboru: application/pdf
Přístupová URL adresa: https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ECOOP.2025.14
-
11
Autoři: a další
Zdroj: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. :1-12
Témata: Patch presence test, Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Binary analysis, Software security, Software Engineering
Popis souboru: application/pdf
Přístupová URL adresa: http://arxiv.org/abs/2312.03393
-
12
Autoři: a další
Zdroj: Proceedings of the IEEE/ACM 46th International Conference on Software Engineering. :1-12
Témata: Patch Presence Test, Software Security, Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Software Engineering, Cryptography and Security (cs.CR), Binary Analysis
Popis souboru: application/pdf
Přístupová URL adresa: http://arxiv.org/abs/2312.11013
-
13
Autoři: a další
Zdroj: IEEE Transactions on Dependable and Secure Computing. 21(4):2917-2929
Témata: Binary analysis, deobfuscation, Encryption, EPROM, filesystem unpacking, Hardware, Internet of Things, Microprogramming, reverse engineering, Sockets, Task analysis
Popis souboru: print
Přístupová URL adresa: https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-350059
-
14
Autoři:
Zdroj: IEEE Access, Vol 12, Pp 34477-34488 (2024)
Témata: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, 02 engineering and technology, transfer learning, compiler provenance recovery, TK1-9971, Machine Learning (cs.LG), machine learning, Binary analysis, 0202 electrical engineering, electronic engineering, information engineering, Electrical engineering. Electronics. Nuclear engineering, fine-tuning, Cryptography and Security (cs.CR)
Přístupová URL adresa: http://arxiv.org/abs/2211.13110
https://doaj.org/article/4a2e4f2fb9664bb9af04afc1b6dbbce6 -
15
Autoři:
Zdroj: IEEE Access, Vol 12, Pp 12667-12682 (2024)
Témata: Compiler inference, classification model, similarity model, 0202 electrical engineering, electronic engineering, information engineering, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, binary analysis, BERT, TK1-9971
Přístupová URL adresa: https://doaj.org/article/182b526ec1c343c280daefd91bde5073
-
16
Autoři: Tsang, Ryan
Témata: Computer engineering, Computer science, Electrical engineering, Binary Analysis, Embedded Systems, Firmware, Reverse Engineering, Security
Popis souboru: application/pdf
-
17
Autoři: DING Duo, SUN Cong, ZHENG Tao
Zdroj: Jisuanji kexue, Vol 51, Iss 10, Pp 208-217 (2024)
Témata: program debloating, binary analysis, fuzzing, binary rewriting, program analysis, Computer software, QA76.75-76.765, Technology (General), T1-995
Popis souboru: electronic resource
Relation: https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2024-51-10-208.pdf; https://doaj.org/toc/1002-137X
Přístupová URL adresa: https://doaj.org/article/7a884387537143afb5c78004c30f4cd3
-
18
Autoři: Roessle, Ian Henry
Thesis Advisors: Electrical and Computer Engineering, Tront, Joseph G., Adams, Stephen Conway, Beling, Peter A., Gaeddert, Joseph Daniel, Jin, Ming
Témata: x86-64 Assembly, Code Abstraction, Symbolic Execution, Formal Verification, Binary Analysis, Binary Diversity, Moving Target Defense, Cyber Resilience
Popis souboru: ETD; application/pdf; application/vnd.openxmlformats-officedocument.wordprocessingml.document
Dostupnost: https://hdl.handle.net/10919/124175
-
19
Autoři: CHEN Liang, SUN Cong
Zdroj: Jisuanji kexue, Vol 51, Iss 9, Pp 383-392 (2024)
Témata: memory forensics, malware detection, operating system security, graph neural network, binary analysis, Computer software, QA76.75-76.765, Technology (General), T1-995
Popis souboru: electronic resource
Relation: https://www.jsjkx.com/fileup/1002-137X/PDF/1002-137X-2024-51-9-383.pdf; https://doaj.org/toc/1002-137X
Přístupová URL adresa: https://doaj.org/article/753c422a670843468cfa35dc8e4bfaf8
-
20
Autoři: a další
Zdroj: PeerJ Computer Science, Vol 11, p e2504 (2025)
Témata: Binary analysis, Similarity detection, Neural network, Electronic computers. Computer science, QA75.5-76.95
Popis souboru: electronic resource
Relation: https://peerj.com/articles/cs-2504.pdf; https://peerj.com/articles/cs-2504/; https://doaj.org/toc/2376-5992
Přístupová URL adresa: https://doaj.org/article/715cba494c79410eb2654a6a638a2ab3
Nájsť tento článok vo Web of Science
Full Text Finder