Search Results - "binary code"
-
1
Authors: Mizuhito Ogawa
Source: Journal of Science and Technology on Information security. :3-18
-
2
Authors:
Source: Proceedings of the 2025 Workshop on Software Understanding and Reverse Engineering. :102-113
-
3
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:1167-1189
-
4
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:1339-1362
-
5
Authors: et al.
Source: International Journal of Computer Network and Information Security. 17:72-88
-
6
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:801-824
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Cryptography and Security, Software Engineering, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2506.11612
-
7
Authors:
Source: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security. :1724-1740
-
8
Authors:
Source: 2025 Systems of Signal Synchronization, Generating and Processing in Telecommunications (SYNCHROINFO). :1-5
-
9
Authors:
Source: 2025 17th International Conference on Electronics, Computers and Artificial Intelligence (ECAI). :1-4
-
10
Authors: et al.
Source: 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). :47-60
-
11
Authors:
Source: 2025 62nd ACM/IEEE Design Automation Conference (DAC). :1-7
-
12
Authors:
Contributors:
Source: urn:tid:203741420
Subject Terms: Verificação de Modelos, Vulnerabilidades de Overflow na Pilha, Código Binário, Execução Concólica, Análise Estática, Teses de mestrado - 2024
File Description: application/pdf
Availability: http://hdl.handle.net/10400.5/95544
-
13
Authors: WEI Youyuan, SONG Jianhua, ZHANG Yan
Source: Jisuanji kexue, Vol 52, Iss 6, Pp 365-380 (2025)
Subject Terms: binary code similarity detection, code representation, software security, malicious code identification, vulnerability search, Computer software, QA76.75-76.765, Technology (General), T1-995
File Description: electronic resource
-
14
Authors: et al.
Source: 2025 Design, Automation & Test in Europe Conference (DATE). :1-7
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Computer Science - Programming Languages, Cryptography and Security (cs.CR), Programming Languages (cs.PL)
Access URL: http://arxiv.org/abs/2404.04132
-
15
Authors: et al.
Source: 2025 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). :383-393
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Machine Learning, Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2412.11177
-
16
Authors:
Source: ACS Synthetic Biology. 14:3348-3355
Access URL: https://pubmed.ncbi.nlm.nih.gov/40333022
-
17
Authors: et al.
Source: Proceedings of the 18th European Workshop on Systems Security. :26-32
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2412.07538
-
18
Authors:
Source: Communications in Computer and Information Science ISBN: 9783032047571
-
19
Authors: Mircea-Petru Ursu
Source: 2025 18th International Conference on Engineering of Modern Electric Systems (EMES). :1-4
-
20
Authors: et al.
Source: 2025 10th International Conference on Intelligent Computing and Signal Processing (ICSP). :1247-1253
Nájsť tento článok vo Web of Science