Search Results - binary code analysis
-
1
Authors: et al.
Source: IEEE Transactions on Dependable and Secure Computing. 22:308-326
Subject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Assembly, Task analysis, Vectors, Transformers, Semantics, Binary codes, Benchmark testing, 01 natural sciences, Cryptography and Security (cs.CR), 0105 earth and related environmental sciences, Machine Learning (cs.LG)
File Description: application/pdf
Access URL: http://arxiv.org/abs/2208.06692
-
2
Authors:
Source: Programming & Computer Software. Dec2025, Vol. 51 Issue 6, p415-428. 14p.
Subject Terms: *BINARY codes, *ALGORITHMS, *ABSTRACTION (Computer science), *DATA flow computing, *SOFTWARE development tools
-
3
Authors:
Source: Proceedings of the ACM Asia Conference on Computer and Communications Security
Proceedings of the 19th ACM Asia Conference on Computer and Communications SecuritySubject Terms: FOS: Computer and information sciences, Computer Science - Machine Learning, Artificial Intelligence (cs.AI), Computer Science - Artificial Intelligence, I.2.6, Machine Learning (cs.LG)
Access URL: http://arxiv.org/abs/2502.08682
-
4
-
5
Authors: et al.
Source: Proceedings of the Thirty-Fourth International Joint Conference on Artificial Intelligence. :7715-7723
-
6
Authors: et al.
Source: IEEE Access, Vol 13, Pp 167139-167164 (2025)
Subject Terms: Code analysis, software security, vulnerability detection, code similarity analysis, cybersecurity, Electrical engineering. Electronics. Nuclear engineering, TK1-9971
File Description: electronic resource
-
7
Authors: et al.
Contributors: et al.
Source: Proceedings of the 23rd International Conference on Software Engineering and Formal Methods ; 23rd International Conference on Software Engineering and Formal Methods ; https://hal.science/hal-05288783 ; 23rd International Conference on Software Engineering and Formal Methods, Nov 2025, Tolède, Spain
Subject Terms: Binary Code Analysis, Finite Automata, Pushdown System with an Upper Stack, Reachability analysis, Reachability analysis Pushdown System with an Upper Stack Finite Automata Binary Code Analysis, [INFO]Computer Science [cs]
-
8
Authors:
Source: Proceedings 2025 Workshop on Binary Analysis Research.
Subject Terms: Machine Learning, FOS: Computer and information sciences, Artificial Intelligence (cs.AI), Artificial Intelligence, Cryptography and Security, Computation and Language, Computation and Language (cs.CL), Cryptography and Security (cs.CR), Machine Learning (cs.LG)
-
9
ORCAS: Obfuscation-Resilient Binary Code Similarity Analysis using Dominance Enhanced Semantic Graph
Authors: et al.
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Cryptography and Security, Software Engineering, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2506.06161
-
10
Authors:
Source: Findings of the Association for Computational Linguistics: NAACL 2024. :1320-1332
-
11
Authors: S. Poornima, R. Mahalakshmi
Source: International Journal on Recent and Innovation Trends in Computing and Communication. 11:927-937
-
12
Authors: et al.
Source: Proceedings of the ACM on Software Engineering. 2:1339-1362
-
13
Authors: et al.
Source: Lecture Notes in Computer Science ISBN: 9783031714696
-
14
-
15
Authors: et al.
-
16
Additional Titles: Spårning av programvaruutveckling utan källkod : Ett inkrementellt tillvägagångssätt för binära diffar
Authors: Holmgren, Rasmus
-
17
Authors: et al.
Source: 2024 IEEE International Conference on Software Maintenance and Evolution (ICSME). :1-12
Subject Terms: Software Engineering (cs.SE), FOS: Computer and information sciences, Computer Science - Software Engineering, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
Access URL: http://arxiv.org/abs/2404.09836
-
18
Authors:
Contributors:
Source: urn:tid:203741420
Subject Terms: Verificação de Modelos, Vulnerabilidades de Overflow na Pilha, Código Binário, Execução Concólica, Análise Estática, Teses de mestrado - 2024
File Description: application/pdf
Availability: http://hdl.handle.net/10400.5/95544
-
19
Authors: Bekrar, Sofia
Thesis Advisors: Grenoble, Groz, Roland, Mounier, Laurent
Subject Terms: Frelatage, Vulnérabilités logicielles, Analyse de couverture, Analyse de code binaire, Génération de tests, Analyse de teinte, Fuzzing, Software vulnerabilities, Coverage analysis, Binary code analysis, Test generation, Taint analysis
Availability: http://www.theses.fr/2013GRENM058
-
20
Authors: et al.
Source: 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS). :1386-1389
Full Text Finder
Nájsť tento článok vo Web of Science