Search Results - Program and binary analysis
-
1
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
ISSN: 2375-1207Published: IEEE 01.05.2023Published in Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)“…ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly…”
Get full text
Conference Proceeding -
2
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing
ISSN: 2375-1207Published: IEEE 19.05.2024Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of…”
Get full text
Conference Proceeding -
3
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning
ISSN: 2375-1207Published: IEEE 19.05.2024Published in Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Binary reverse engineering is an arduous and tedious task performed by skilled and expensive human analysts…”
Get full text
Conference Proceeding -
4
Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks
ISSN: 2375-1207Published: IEEE 12.05.2025Published in Proceedings - IEEE Symposium on Security and Privacy (12.05.2025)“…Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers…”
Get full text
Conference Proceeding -
5
Robust Binary Program Debloating
ISSN: 1002-137XPublished: Editorial office of Computer Science 01.10.2024Published in Ji suan ji ke xue (01.10.2024)“… attacks.Binary program debloating can identify and remove the redundant code based on the binary analysis of the application,so as to reduce the attack…”
Get full text
Journal Article -
6
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis
ISSN: 1383-469X, 1572-8153Published: New York Springer US 01.08.2021Published in Mobile networks and applications (01.08.2021)“…How to efficiently and reasonably analyze binary programs has always been the primary issue in the field of software security…”
Get full text
Journal Article -
7
SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs
ISSN: 1673-5447Published: China Institute of Communications 01.08.2021Published in China communications (01.08.2021)“… Based on this observation, we propose a hybrid fuzzing method assisted by static analysis for binary programs…”
Get full text
Journal Article -
8
Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“… To meet these challenges, machine learning-based binary code analysis frameworks attract substantial attention due to their automated feature extraction and drastically reduced efforts needed on large-scale programs…”
Get full text
Journal Article -
9
THE MAGELLAN PFS PLANET SEARCH PROGRAM: RADIAL VELOCITY AND STELLAR ABUNDANCE ANALYSES OF THE 360 au, METAL-POOR BINARY “TWINS” HD 133131A & B
ISSN: 0004-6256, 1538-3881, 1538-3881Published: United States 01.12.2016Published in The Astronomical journal (01.12.2016)“…We present a new precision radial velocity (RV) data set that reveals multiple planets orbiting the stars in the ∼360 au, G2+G2 “twin” binary HD 133131AB…”
Get full text
Journal Article -
10
Static Analysis of JNI Programs via Binary Decompilation
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.05.2023Published in IEEE transactions on software engineering (01.05.2023)“… Unfortunately, such source code analysis is not applicable to compiled JNI programs that are not open-sourced or open-source JNI programs containing third-party binary libraries…”
Get full text
Journal Article -
11
Empirical Study of Software Composition Analysis Tools for C/C++ Binary Programs
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2024Published in IEEE access (2024)“… To this end, this paper presents a comprehensive evaluation of software composition analysis techniques for accurately identifying components in C/C++ binary programs…”
Get full text
Journal Article -
12
Bin2vec: learning representations of binary executable programs for security tasks
ISSN: 2523-3246, 2523-3246Published: Singapore Springer Singapore 01.07.2021Published in Cybersecurity (Singapore) (01.07.2021)“…Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts…”
Get full text
Journal Article -
13
Dynamic Program Analysis Enhanced Binary Recompilation
ISBN: 9798383592724Published: ProQuest Dissertations & Theses 01.01.2024“…Users of proprietary and/or legacy programs without vendor support are denied the significant advances in compiler technologies of the past decades…”
Get full text
Dissertation -
14
A program for fractal and multifractal analysis of two-dimensional binary images: Computer algorithms versus mathematical theory
ISSN: 0016-7061, 1872-6259Published: Amsterdam Elsevier B.V 01.10.2006Published in Geoderma (01.10.2006)“…In this paper we present a tool to carry out the multifractal analysis of binary, two-dimensional images through the calculation of the Rényi D( q…”
Get full text
Journal Article Conference Proceeding -
15
MIL: A language to build program analysis tools through static binary instrumentation
ISSN: 1094-7256Published: IEEE 01.12.2013Published in 20th Annual International Conference on High Performance Computing (01.12.2013)“… Instrumentation techniques, through the insertion of code directly into binaries, are essential for program analyses used in debugging, runtime profiling, and performance evaluation…”
Get full text
Conference Proceeding -
16
Characterization of runtime resource usage from analysis of binary executable programs
ISSN: 1568-4946, 1872-9681Published: Elsevier B.V 01.10.2018Published in Applied soft computing (01.10.2018)“…[Display omitted] •A method is proposed to characterize a computer program's runtime resource usage from the analysis of its binary executable file…”
Get full text
Journal Article -
17
Binary Diffing as a Network Alignment Problem via Belief Propagation
ISSN: 2643-1572Published: IEEE 01.11.2021Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (01.11.2021)“…In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing…”
Get full text
Conference Proceeding -
18
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions
ISSN: 2169-3536, 2169-3536Published: Piscataway IEEE 2019Published in IEEE access (2019)“…The security of binary programs is significantly threatened by software vulnerabilities…”
Get full text
Journal Article -
19
DeMal: Module decomposition of malware based on community discovery
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.06.2022Published in Computers & security (01.06.2022)“… While existing static or dynamic analysis techniques can meet the common user needs for malware detection, analysts desire a more detailed overview to uncover the program architecture…”
Get full text
Journal Article -
20
Timing Analysis of Binary Programs with UPPAAL
ISSN: 1550-4808Published: IEEE 01.07.2013Published in Proceedings / International Conference on Application of Concurrency to System Design (01.07.2013)“…We address the problem of computing accurate Worst-Case Execution Time (WCET). We propose a fully automatic and modular methodology based on program slicing and real-time model-checking…”
Get full text
Conference Proceeding

