Search Results - "binary analysis"
-
1
A formal framework for LLM-assisted automated generation of Zeek signatures from binary artifacts
ISSN: 0167-739XPublished: Elsevier B.V 01.02.2026Published in Future generation computer systems (01.02.2026)“…Designing semantically meaningful and operationally effective intrusion detection signatures remains a labor-intensive and expertise-driven task, particularly…”
Get full text
Journal Article -
2
An empirical evaluation of static, dynamic, and hybrid slicing of WebAssembly binaries
ISSN: 0164-1212Published: Elsevier Inc 01.10.2025Published in The Journal of systems and software (01.10.2025)“…The WebAssembly standard aims to form a portable compilation target, enabling the cross-platform distribution of programs written in a variety of languages…”
Get full text
Journal Article -
3
A comprehensive framework for identifying contributing factors of soil trace metal pollution using Geodetector and spatial bivariate analysis
ISSN: 0048-9697, 1879-1026, 1879-1026Published: Elsevier B.V 20.01.2023Published in The Science of the total environment (20.01.2023)“…The accurate identification of pollution sources is important for controlling soil pollution. However, the widely used Positive matrix factorization (PMF)…”
Get full text
Journal Article -
4
Surviving zero-day attacks using spatial specialization
ISSN: 0167-4048Published: Elsevier Ltd 01.01.2026Published in Computers & security (01.01.2026)“…•A novel approach called spatial specialization that can render zero-day attacks ineffective by restricting malicious usage of system calls while allowing…”
Get full text
Journal Article -
5
Protocol Reverse-Engineering Methods and Tools: A Survey
ISSN: 0140-3664Published: Elsevier B.V 15.01.2022Published in Computer communications (15.01.2022)“…The widespread utilization of network protocols raises many security and privacy concerns. To address them, protocol reverse-engineering (PRE) has been broadly…”
Get full text
Journal Article -
6
oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.11.2021Published in IEEE transactions on software engineering (01.11.2021)“…The Spectre vulnerability in modern processors has been widely reported. The key insight in this vulnerability is that speculative execution in processors can…”
Get full text
Journal Article -
7
Learning Approximate Execution Semantics From Traces for Binary Function Similarity
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.04.2023Published in IEEE transactions on software engineering (01.04.2023)“…Detecting semantically similar binary functions - a crucial capability with broad security usages including vulnerability detection, malware analysis, and…”
Get full text
Journal Article -
8
SABLM-VD: Vulnerability detection with a semantic-aware binary language model
ISSN: 0950-5849Published: Elsevier B.V 01.02.2026Published in Information and software technology (01.02.2026)“…Static detection of binary code vulnerabilities based on deep learning is an important research field in computer security. In existing methods, those mainly…”
Get full text
Journal Article -
9
BinOpLeR: Optimization level recovery from binaries based on rich semantic instruction image and weighted voting
ISSN: 0950-5849Published: Elsevier B.V 01.05.2025Published in Information and software technology (01.05.2025)“…Compiler toolchain differences result in binary code diversity, wherein the impacts of different optimization levels on binary code severely constrains the…”
Get full text
Journal Article -
10
Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode
ISSN: 0164-1212, 1873-1228Published: Elsevier Inc 01.05.2023Published in The Journal of systems and software (01.05.2023)“…Millions of smart contracts have been deployed onto the Ethereum platform, posing potential attack subjects. Therefore, analyzing contract binaries is vital…”
Get full text
Journal Article -
11
Update with care: Testing candidate bug fixes and integrating selective updates through binary rewriting
ISSN: 0164-1212, 1873-1228Published: Elsevier Inc 01.09.2022Published in The Journal of systems and software (01.09.2022)“…Enterprise software updates depend on the interaction between user and developer organizations. This interaction becomes especially complex when a single…”
Get full text
Journal Article -
12
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection
ISSN: 0167-4048, 1872-6208Published: Amsterdam Elsevier Ltd 01.09.2021Published in Computers & security (01.09.2021)“…Deep learning has shown effectiveness in binary software vulnerability detection due to its outstanding feature extraction capability independent of human…”
Get full text
Journal Article -
13
Airport detection in remote sensing real-open world using deep learning
ISSN: 0952-1976, 1873-6769Published: Elsevier Ltd 01.06.2023Published in Engineering applications of artificial intelligence (01.06.2023)“…Remote sensing real-open world of large-scare areas brings a high false alarm rate to object detection because of highly complex backgrounds. In this study, we…”
Get full text
Journal Article -
14
1H NMR Relaxation Study to Evaluate the Crystalline State of Active Pharmaceutical Ingredients Containing Solid Dosage Forms Using Time Domain NMR
ISSN: 1520-6017, 1520-6017Published: 01.01.2019Published in Journal of pharmaceutical sciences (01.01.2019)“…The aim of this study was to demonstrate the usefulness of the time domain nuclear magnetic resonance (TD-NMR) method to characterize the crystalline state of…”
Get more information
Journal Article -
15
Osprey: A fast and accurate patch presence test framework for binaries
ISSN: 0140-3664, 1873-703XPublished: Elsevier B.V 01.05.2021Published in Computer communications (01.05.2021)“…With the rapid development of Internet of Things (IoT), a new paradigm named Mobile Edge Computing (MEC) is proposed to push the cloud computing to the edge…”
Get full text
Journal Article -
16
BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection
ISSN: 0098-5589, 1939-3520Published: New York IEEE 01.10.2024Published in IEEE transactions on software engineering (01.10.2024)“…Binary Code Similarity Detection (BCSD) is a fundamental binary analysis technique in the area of software security. Recently, advanced deep learning…”
Get full text
Journal Article -
17
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network
ISSN: 0140-3664, 1873-703XPublished: Elsevier B.V 01.01.2023Published in Computer communications (01.01.2023)“…Automatic static vulnerability analysis for IoT devices is always an important and challenging research problem. Traditional vulnerability finding methods are…”
Get full text
Journal Article -
18
Semantics-aware obfuscation scheme prediction for binary
ISSN: 0167-4048, 1872-6208Published: Elsevier Ltd 01.12.2020Published in Computers & security (01.12.2020)“…By restoring the program into an easier understandable form, deobfuscation is an important technique for detecting and analyzing malicious software. To enable…”
Get full text
Journal Article -
19
R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries
ISSN: 2576-9103Published: IEEE 09.12.2024Published in Proceedings of the annual Computer Security Applications Conference (09.12.2024)“…Cryptographic functions are instrumental in securing our electronic communications and systems; yet time and time again they are mis-used, mis-implemented, or…”
Get full text
Conference Proceeding -
20
Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis
ISSN: 2569-2925, 2569-2925Published: Ruhr-Universität Bochum 03.12.2020Published in IACR transactions on cryptographic hardware and embedded systems (03.12.2020)“…The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms…”
Get full text
Journal Article