Search Results - binary analysis
-
1
Authors: et al.
Source: Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.2. :5260-5269
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Machine Learning, Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2502.19725
-
2
Authors: et al.
Source: ACM Transactions on Privacy and Security.
-
3
Authors: et al.
Source: Automated Software Engineering. 32
-
4
Authors: et al.
Source: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security. :3689-3703
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2409.01994
-
5
Authors:
Source: IEEE Access, Vol 13, Pp 212591-212607 (2025)
Subject Terms: Binary program understanding, machine learning, reverse engineering, static analysis, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
6
Authors: et al.
Source: Prizren Social Science Journal, Vol 8, Iss 1 (2024)
PRIZREN SOCIAL SCIENCE JOURNAL; Vol. 8 No. 1 (2024): January-April 2024; 1-6Subject Terms: Social sciences (General), H1-99, Special Tea, Preference, Medicinal Plants, Consumers, Binary Logistic Model
File Description: application/pdf
-
7
Authors:
Source: International Journal of Information Security. Dec2025, Vol. 24 Issue 6, p1-17. 17p.
-
8
Authors: Tsang, Ryan
Subject Terms: Computer engineering, Computer science, Electrical engineering, Binary Analysis, Embedded Systems, Firmware, Reverse Engineering, Security
File Description: application/pdf
-
9
Authors: et al.
Source: Journal of the Japan Institute of Energy. 103:105-114
-
10
Authors: et al.
Source: Applied Network Science, Vol 10, Iss 1, Pp 1-24 (2025)
Subject Terms: Obfuscation, Classification, GNN, Graphs, Graph representation learning, Security, Applied mathematics. Quantitative methods, T57-57.97
File Description: electronic resource
Relation: https://doaj.org/toc/2364-8228
-
11
Authors: et al.
Source: Proceedings of the 2024 on Cloud Computing Security Workshop. :53-65
-
12
-
13
Authors: et al.
Source: Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence. :7715-7723
-
14
Authors:
-
15
Authors:
Source: Tehnički glasnik. 19:560-574
Subject Terms: LLM security, OWASP Top 10, software security, memory vulnerabilities, AI-generated code, static-dynamic analysis, binary analysis, encryption vulnerabilities
File Description: application/pdf
-
16
-
17
Authors: et al.
Source: 2025 IEEE 10th European Symposium on Security and Privacy (EuroS&P). :980-1001
-
18
Authors: et al.
-
19
-
20
ORCAS: Obfuscation-Resilient Binary Code Similarity Analysis using Dominance Enhanced Semantic Graph
Authors: et al.
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Cryptography and Security, Software Engineering, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2506.06161
Nájsť tento článok vo Web of Science
Full Text Finder