Search Results - "binary code analysis"
-
1
Authors: et al.
Contributors: et al.
Source: Proceedings of the 23rd International Conference on Software Engineering and Formal Methods ; 23rd International Conference on Software Engineering and Formal Methods ; https://hal.science/hal-05288783 ; 23rd International Conference on Software Engineering and Formal Methods, Nov 2025, Tolède, Spain
Subject Terms: Binary Code Analysis, Finite Automata, Pushdown System with an Upper Stack, Reachability analysis, Reachability analysis Pushdown System with an Upper Stack Finite Automata Binary Code Analysis, [INFO]Computer Science [cs]
-
2
Authors:
Contributors:
Source: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. :808-820
Subject Terms: FOS: Computer and information sciences, Computer Science - Cryptography and Security, [INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE], 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, 02 engineering and technology, clone search, Cryptography and Security (cs.CR), spectral analysis, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
Access URL: http://arxiv.org/abs/2210.13063
-
3
Authors: et al.
Contributors: et al.
Source: Proceedings of the 16th International Conference on Availability, Reliability and Security. :1-12
Subject Terms: malware, 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, call graph, 02 engineering and technology, [INFO] Computer Science [cs], similarity
File Description: application/pdf
-
4
Authors:
Contributors:
Source: 2021 IEEE International Conference on Software Analysis, Evolution and Reengineering (SANER). :131-141
Subject Terms: 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, graph neural networks, [INFO.INFO-LG] Computer Science [cs]/Machine Learning [cs.LG], 02 engineering and technology, toolchain provenance, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
-
5
Authors:
Source: Journal of Universal Computer Science, Vol 28, Iss 7, Pp 758-775 (2022)
JUCS-Journal of Universal Computer Science 28(7): 758-775Subject Terms: reverse engineering, function identification, function identi, Electronic computers. Computer science, 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, QA75.5-76.95, 02 engineering and technology, disassembly, Graph neural network
File Description: text/html
-
6
Authors: et al.
Source: All Works
Subject Terms: Binary code analysis, Compiler provenance, Malware analysis, Reverse engineering, Computer Sciences
File Description: application/pdf
Relation: https://zuscholars.zu.ac.ae/works/6635; https://zuscholars.zu.ac.ae/context/works/article/7672/viewcontent/1_s2.0_S2666281724000830_main.pdf
-
7
Authors: et al.
Source: IEEE Access, Vol 9, Pp 49160-49175 (2021)
Subject Terms: neural network, 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, compiler identification, Electrical engineering. Electronics. Nuclear engineering, 02 engineering and technology, Software forensics, TK1-9971
-
8
Authors: Holmgren, Rasmus
Subject Terms: Datavetenskap (datalogi), Binary Similarity Detection, Computer Sciences, Software Evolution, Software Reverse Engineering, Incremental Binary Diffing, Binary Diffing, Binary Code Analysis, Function Matching
File Description: application/pdf
-
9
Authors: et al.
Contributors: et al.
Source: 25th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES2021)
https://hal.science/hal-03505307
25th International Conference on Knowledge Based and Intelligent information and Engineering Systems (KES2021), Aug 2021, Szczecin, Poland. pp.961-970, ⟨10.1016/j.procs.2021.08.099⟩Subject Terms: Network Alignment, Graph Matching, Belief Propagation, Binary Diffing, Binary Code Analysis, [STAT.ML]Statistics [stat]/Machine Learning [stat.ML], [MATH.MATH-ST]Mathematics [math]/Statistics [math.ST], [INFO.INFO-LG]Computer Science [cs]/Machine Learning [cs.LG]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/2112.15336; ARXIV: 2112.15336
-
10
Authors: Nan Jiang
Subject Terms: Deep learning, Automated software engineering, Software engineering, Large language model, Automated program repair, Code generation, Binary code analysis
-
11
Authors: CONSOLE, FRANCESCA
Subject Terms: cybersecurity, code analysis, binary code analysis, code smell, nlp, neural networks, machine learning
File Description: application/pdf
Access URL: https://hdl.handle.net/11573/1720112
-
12
Authors: et al.
Subject Terms: Binary code analysis, Binary similarity analysis, Software composition analysis, Software reuse, Vulnerability detection
Relation: https://doi.org/10.1109/EuroSP60621.2024.00034; http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=001304430300026
Availability: http://repository.hkust.edu.hk/ir/Record/1783.1-147321
https://doi.org/10.1109/EuroSP60621.2024.00034
http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2024&rft.spage=&rft.aulast=Wang&rft.aufirst=Huaijin&rft.atitle=Are+We+There+Yet%3F+Filling+the+Gap+Between+ML-Based+Binary+Similarity+Analysis+and+Binary+Software+Composition+Analysis&rft.title=
http://www.scopus.com/record/display.url?eid=2-s2.0-85203675956&origin=inward
http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=001304430300026 -
13
Authors:
Source: PROCEEDINGS OF THE 2024 WORKSHOP ON RESEARCH ON OFFENSIVE AND DEFENSIVE TECHNIQUES IN THE CONTEXT OF MAN AT THE END (MATE) ATTACKS, CHECKMATE 2024 ; ISBN: 9798400712302
Subject Terms: Technology and Engineering, Dynamic binary code analysis, cryptographic key identification
File Description: application/pdf
Relation: https://biblio.ugent.be/publication/01JJKHJFFTPZR7NGWHSXR46TR2; http://doi.org/10.1145/3689934.3690818; https://biblio.ugent.be/publication/01JJKHJFFTPZR7NGWHSXR46TR2/file/01JJKHN5RX1WACG346S405K2XX
-
14
Authors: et al.
Contributors: et al.
Source: Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering. :1-12
Subject Terms: dynamic symbolic execution, use-after-free, Vulnerability scanners, [INFO.INFO-CL] Computer Science [cs]/Computation and Language [cs.CL], vulnerability detection, 0202 electrical engineering, electronic engineering, information engineering, binary code analysis, 02 engineering and technology, [INFO] Computer Science [cs], automated exploit generation, Software security engineering, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
-
15
Authors: et al.
Contributors: et al.
Source: SEFM 2023 - 21st International Conference on Software Engineering and Formal Methods ; https://hal.science/hal-04288806 ; SEFM 2023 - 21st International Conference on Software Engineering and Formal Methods, Nov 2023, Eindhoven, Netherlands. pp.47-65, ⟨10.1007/978-3-031-47115-5_4⟩
Subject Terms: Symbolic execution, Program analysis, Binary code analysis, A-star algorithm, [INFO]Computer Science [cs]
Subject Geographic: Eindhoven, Netherlands
Relation: hal-04288806; https://hal.science/hal-04288806; https://hal.science/hal-04288806/document; https://hal.science/hal-04288806/file/sefm2023-accepted-manuscript.pdf
-
16
-
17
Authors: et al.
Contributors: et al.
Source: SECURITY AND PRIVACY. 3
Subject Terms: Exploitable vulnerability detection, Symbolic execution, 0202 electrical engineering, electronic engineering, information engineering, Exploitable flaws, 02 engineering and technology, x86 64 assembly securit, Static analysis, Binary code analysis, [INFO.INFO-FL] Computer Science [cs]/Formal Languages and Automata Theory [cs.FL], [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
File Description: application/pdf
-
18
Authors: et al.
Contributors: et al.
Source: 16th International Workshop on Worst-Case Execution Time Analysis (WCET 2016)
https://hal.science/hal-01713140
16th International Workshop on Worst-Case Execution Time Analysis (WCET 2016), Jul 2016, Toulouse, France. pp.7:1--7:10, ⟨10.4230/OASIcs.WCET.2016.7⟩Subject Terms: and phrases Program Slicing, Binary Code Analysis, WCET Analysis, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-PL]Computer Science [cs]/Programming Languages [cs.PL]
-
19
Authors: et al.
Subject Terms: adversarial examples, binary code analysis, graph neural networks, reverse engineering
Relation: https://doi.org/10.1109/ICSME55016.2022.00019; http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000908031000011
Availability: http://repository.hkust.edu.hk/ir/Record/1783.1-124553
https://doi.org/10.1109/ICSME55016.2022.00019
http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2022&rft.spage=117&rft.aulast=Wong&rft.aufirst=&rft.atitle=Deceiving+Deep+Neural+Networks-Based+Binary+Code+Matching+with+Adversarial+Programs&rft.title=Proceedings+-+2022+IEEE+International+Conference+on+Software+Maintenance+and+Evolution,+ICSME+2022
http://gateway.isiknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=LinksAMR&SrcApp=PARTNER_APP&DestLinkType=FullRecord&DestApp=WOS&KeyUT=000908031000011
http://www.scopus.com/record/display.url?eid=2-s2.0-85146240086&origin=inward -
20
Authors: et al.
Contributors: et al.
Subject Terms: software, dataset, binary code analysis, software engineering, clone search, spectral analysis, cyber security
Relation: https://zenodo.org/communities/eu/; https://zenodo.org/records/8289599; oai:zenodo.org:8289599; https://doi.org/10.5281/zenodo.8289599
Nájsť tento článok vo Web of Science
Full Text Finder