Search Results - Program and binary analysis

Refine Results
  1. 1

    D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling by Ye, Yapeng, Zhang, Zhuo, Shi, Qingkai, Aafer, Yousra, Zhang, Xiangyu

    ISSN: 2375-1207
    Published: IEEE 01.05.2023
    “…ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly…”
    Get full text
    Conference Proceeding
  2. 2

    DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing by Ammann, Max, Hirschi, Lucca, Kremer, Steve

    ISSN: 2375-1207
    Published: IEEE 19.05.2024
    “…Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of…”
    Get full text
    Conference Proceeding
  3. 3
  4. 4

    Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks by Wiebing, Sander, Giuffrida, Cristiano

    ISSN: 2375-1207
    Published: IEEE 12.05.2025
    “…Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers…”
    Get full text
    Conference Proceeding
  5. 5

    Robust Binary Program Debloating by DING Duo, SUN Cong, ZHENG Tao

    ISSN: 1002-137X
    Published: Editorial office of Computer Science 01.10.2024
    Published in Ji suan ji ke xue (01.10.2024)
    “… attacks.Binary program debloating can identify and remove the redundant code based on the binary analysis of the application,so as to reduce the attack…”
    Get full text
    Journal Article
  6. 6

    Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis by Lu, Hui, Jin, Chengjie, Helu, Xiaohan, Zhang, Man, Sun, Yanbin, Han, Yi, Tian, Zhihong

    ISSN: 1383-469X, 1572-8153
    Published: New York Springer US 01.08.2021
    Published in Mobile networks and applications (01.08.2021)
    “…How to efficiently and reasonably analyze binary programs has always been the primary issue in the field of software security…”
    Get full text
    Journal Article
  7. 7

    SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs by Wang, Wenjie, Tian, Donghai, Ma, Rui, Wei, Hang, Ying, Qianjin, Jia, Xiaoqi, Zuo, Lei

    ISSN: 1673-5447
    Published: China Institute of Communications 01.08.2021
    Published in China communications (01.08.2021)
    “… Based on this observation, we propose a hybrid fuzzing method assisted by static analysis for binary programs…”
    Get full text
    Journal Article
  8. 8

    Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study by Xue, Hongfa, Sun, Shaowen, Venkataramani, Guru, Lan, Tian

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “… To meet these challenges, machine learning-based binary code analysis frameworks attract substantial attention due to their automated feature extraction and drastically reduced efforts needed on large-scale programs…”
    Get full text
    Journal Article
  9. 9

    THE MAGELLAN PFS PLANET SEARCH PROGRAM: RADIAL VELOCITY AND STELLAR ABUNDANCE ANALYSES OF THE 360 au, METAL-POOR BINARY “TWINS” HD 133131A & B by Teske, Johanna K., Shectman, Stephen A., Vogt, Steve S., Díaz, Matías, Butler, R. Paul, Crane, Jeffrey D., Thompson, Ian B., Arriagada, Pamela

    ISSN: 0004-6256, 1538-3881, 1538-3881
    Published: United States 01.12.2016
    Published in The Astronomical journal (01.12.2016)
    “…We present a new precision radial velocity (RV) data set that reveals multiple planets orbiting the stars in the ∼360 au, G2+G2 “twin” binary HD 133131AB…”
    Get full text
    Journal Article
  10. 10

    Static Analysis of JNI Programs via Binary Decompilation by Park, Jihee, Lee, Sungho, Hong, Jaemin, Ryu, Sukyoung

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.05.2023
    Published in IEEE transactions on software engineering (01.05.2023)
    “… Unfortunately, such source code analysis is not applicable to compiled JNI programs that are not open-sourced or open-source JNI programs containing third-party binary libraries…”
    Get full text
    Journal Article
  11. 11

    Empirical Study of Software Composition Analysis Tools for C/C++ Binary Programs by Ning, Yuqiao, Zhang, Yanan, Ma, Chao, Guo, Zhen, Yu, Longhai

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2024
    Published in IEEE access (2024)
    “… To this end, this paper presents a comprehensive evaluation of software composition analysis techniques for accurately identifying components in C/C++ binary programs…”
    Get full text
    Journal Article
  12. 12

    Bin2vec: learning representations of binary executable programs for security tasks by Arakelyan, Shushan, Arasteh, Sima, Hauser, Christophe, Kline, Erik, Galstyan, Aram

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Singapore 01.07.2021
    Published in Cybersecurity (Singapore) (01.07.2021)
    “…Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts…”
    Get full text
    Journal Article
  13. 13

    Dynamic Program Analysis Enhanced Binary Recompilation by Parzefall, Fabian

    ISBN: 9798383592724
    Published: ProQuest Dissertations & Theses 01.01.2024
    “…Users of proprietary and/or legacy programs without vendor support are denied the significant advances in compiler technologies of the past decades…”
    Get full text
    Dissertation
  14. 14

    A program for fractal and multifractal analysis of two-dimensional binary images: Computer algorithms versus mathematical theory by Perrier, Edith, Tarquis, Ana M., Dathe, Annette

    ISSN: 0016-7061, 1872-6259
    Published: Amsterdam Elsevier B.V 01.10.2006
    Published in Geoderma (01.10.2006)
    “…In this paper we present a tool to carry out the multifractal analysis of binary, two-dimensional images through the calculation of the Rényi D( q…”
    Get full text
    Journal Article Conference Proceeding
  15. 15

    MIL: A language to build program analysis tools through static binary instrumentation by Charif-Rubial, Andres S., Barthou, Denis, Valensi, Cedric, Shende, Sameer, Malony, Allen, Jalby, William

    ISSN: 1094-7256
    Published: IEEE 01.12.2013
    “… Instrumentation techniques, through the insertion of code directly into binaries, are essential for program analyses used in debugging, runtime profiling, and performance evaluation…”
    Get full text
    Conference Proceeding
  16. 16

    Characterization of runtime resource usage from analysis of binary executable programs by de Souza Pinto, Renê, Botazzo Delbem, Alexandre Claudio, Monaco, Francisco José

    ISSN: 1568-4946, 1872-9681
    Published: Elsevier B.V 01.10.2018
    Published in Applied soft computing (01.10.2018)
    “…[Display omitted] •A method is proposed to characterize a computer program's runtime resource usage from the analysis of its binary executable file…”
    Get full text
    Journal Article
  17. 17

    Binary Diffing as a Network Alignment Problem via Belief Propagation by Mengin, Elie, Rossi, Fabrice

    ISSN: 2643-1572
    Published: IEEE 01.11.2021
    “…In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing…”
    Get full text
    Conference Proceeding
  18. 18

    Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions by Hu, Yikun, Zhang, Yuanyuan, Gu, Dawu

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2019
    Published in IEEE access (2019)
    “…The security of binary programs is significantly threatened by software vulnerabilities…”
    Get full text
    Journal Article
  19. 19

    DeMal: Module decomposition of malware based on community discovery by Huang, Yuyao, Shu, Hui, Kang, Fei

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.06.2022
    Published in Computers & security (01.06.2022)
    “… While existing static or dynamic analysis techniques can meet the common user needs for malware detection, analysts desire a more detailed overview to uncover the program architecture…”
    Get full text
    Journal Article
  20. 20

    Timing Analysis of Binary Programs with UPPAAL by Cassez, Franck, Bechennec, Jean-Luc

    ISSN: 1550-4808
    Published: IEEE 01.07.2013
    “…We address the problem of computing accurate Worst-Case Execution Time (WCET). We propose a fully automatic and modular methodology based on program slicing and real-time model-checking…”
    Get full text
    Conference Proceeding