Search Results - "binary analysis"

Refine Results
  1. 1

    A formal framework for LLM-assisted automated generation of Zeek signatures from binary artifacts by Greco, Claudia, Ianni, Michele

    ISSN: 0167-739X
    Published: Elsevier B.V 01.02.2026
    Published in Future generation computer systems (01.02.2026)
    “…Designing semantically meaningful and operationally effective intrusion detection signatures remains a labor-intensive and expertise-driven task, particularly…”
    Get full text
    Journal Article
  2. 2

    An empirical evaluation of static, dynamic, and hybrid slicing of WebAssembly binaries by Stiévenart, Quentin, Binkley, David, De Roover, Coen

    ISSN: 0164-1212
    Published: Elsevier Inc 01.10.2025
    Published in The Journal of systems and software (01.10.2025)
    “…The WebAssembly standard aims to form a portable compilation target, enabling the cross-platform distribution of programs written in a variety of languages…”
    Get full text
    Journal Article
  3. 3

    A comprehensive framework for identifying contributing factors of soil trace metal pollution using Geodetector and spatial bivariate analysis by Shi, Hangyuan, Wang, Peng, Zheng, Jiatong, Deng, Yirong, Zhuang, Changwei, Huang, Fei, Xiao, Rongbo

    ISSN: 0048-9697, 1879-1026, 1879-1026
    Published: Elsevier B.V 20.01.2023
    Published in The Science of the total environment (20.01.2023)
    “…The accurate identification of pollution sources is important for controlling soil pollution. However, the widely used Positive matrix factorization (PMF)…”
    Get full text
    Journal Article
  4. 4

    Surviving zero-day attacks using spatial specialization by Asadujjaman, A S M, Falcão, Eduardo, Brito, Andrey, Rojas, Elisa

    ISSN: 0167-4048
    Published: Elsevier Ltd 01.01.2026
    Published in Computers & security (01.01.2026)
    “…•A novel approach called spatial specialization that can render zero-day attacks ineffective by restricting malicious usage of system calls while allowing…”
    Get full text
    Journal Article
  5. 5

    Protocol Reverse-Engineering Methods and Tools: A Survey by Huang, Yuyao, Shu, Hui, Kang, Fei, Guang, Yan

    ISSN: 0140-3664
    Published: Elsevier B.V 15.01.2022
    Published in Computer communications (15.01.2022)
    “…The widespread utilization of network protocols raises many security and privacy concerns. To address them, protocol reverse-engineering (PRE) has been broadly…”
    Get full text
    Journal Article
  6. 6

    oo7: Low-Overhead Defense Against Spectre Attacks via Program Analysis by Wang, Guanhua, Chattopadhyay, Sudipta, Gotovchits, Ivan, Mitra, Tulika, Roychoudhury, Abhik

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.11.2021
    Published in IEEE transactions on software engineering (01.11.2021)
    “…The Spectre vulnerability in modern processors has been widely reported. The key insight in this vulnerability is that speculative execution in processors can…”
    Get full text
    Journal Article
  7. 7

    Learning Approximate Execution Semantics From Traces for Binary Function Similarity by Pei, Kexin, Xuan, Zhou, Yang, Junfeng, Jana, Suman, Ray, Baishakhi

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.04.2023
    Published in IEEE transactions on software engineering (01.04.2023)
    “…Detecting semantically similar binary functions - a crucial capability with broad security usages including vulnerability detection, malware analysis, and…”
    Get full text
    Journal Article
  8. 8

    SABLM-VD: Vulnerability detection with a semantic-aware binary language model by Li, Qinghao, Liu, Tieming, Liu, Wei, Tang, Yonghe, Liu, Chunling, Dong, Weiyu

    ISSN: 0950-5849
    Published: Elsevier B.V 01.02.2026
    Published in Information and software technology (01.02.2026)
    “…Static detection of binary code vulnerabilities based on deep learning is an important research field in computer security. In existing methods, those mainly…”
    Get full text
    Journal Article
  9. 9

    BinOpLeR: Optimization level recovery from binaries based on rich semantic instruction image and weighted voting by Li, Xiaonan, Li, Qingbao, Zhang, Guimin, Liu, Jinjin, Yue, Shudan, Jiao, Weihua

    ISSN: 0950-5849
    Published: Elsevier B.V 01.05.2025
    Published in Information and software technology (01.05.2025)
    “…Compiler toolchain differences result in binary code diversity, wherein the impacts of different optimization levels on binary code severely constrains the…”
    Get full text
    Journal Article
  10. 10

    Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode by He, Jiahao, Li, Shuangyin, Wang, Xinming, Cheung, Shing-Chi, Zhao, Gansen, Yang, Jinji

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.05.2023
    Published in The Journal of systems and software (01.05.2023)
    “…Millions of smart contracts have been deployed onto the Ethereum platform, posing potential attack subjects. Therefore, analyzing contract binaries is vital…”
    Get full text
    Journal Article
  11. 11

    Update with care: Testing candidate bug fixes and integrating selective updates through binary rewriting by Saieva, Anthony, Kaiser, Gail

    ISSN: 0164-1212, 1873-1228
    Published: Elsevier Inc 01.09.2022
    Published in The Journal of systems and software (01.09.2022)
    “…Enterprise software updates depend on the interaction between user and developer organizations. This interaction becomes especially complex when a single…”
    Get full text
    Journal Article
  12. 12

    HAN-BSVD: A hierarchical attention network for binary software vulnerability detection by Yan, Han, Luo, Senlin, Pan, Limin, Zhang, Yifei

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.09.2021
    Published in Computers & security (01.09.2021)
    “…Deep learning has shown effectiveness in binary software vulnerability detection due to its outstanding feature extraction capability independent of human…”
    Get full text
    Journal Article
  13. 13

    Airport detection in remote sensing real-open world using deep learning by Li, Ning, Cheng, Liang, Ji, Chen, Chen, Hui, Geng, WanXuan, Yang, WeiMing

    ISSN: 0952-1976, 1873-6769
    Published: Elsevier Ltd 01.06.2023
    “…Remote sensing real-open world of large-scare areas brings a high false alarm rate to object detection because of highly complex backgrounds. In this study, we…”
    Get full text
    Journal Article
  14. 14

    1H NMR Relaxation Study to Evaluate the Crystalline State of Active Pharmaceutical Ingredients Containing Solid Dosage Forms Using Time Domain NMR by Okada, Kotaro, Hirai, Daijiro, Kumada, Shungo, Kosugi, Atsushi, Hayashi, Yoshihiro, Onuki, Yoshinori

    ISSN: 1520-6017, 1520-6017
    Published: 01.01.2019
    Published in Journal of pharmaceutical sciences (01.01.2019)
    “…The aim of this study was to demonstrate the usefulness of the time domain nuclear magnetic resonance (TD-NMR) method to characterize the crystalline state of…”
    Get more information
    Journal Article
  15. 15

    Osprey: A fast and accurate patch presence test framework for binaries by Sun, Peiyuan, Yan, Qiben, Zhou, Haoyi, Li, Jianxin

    ISSN: 0140-3664, 1873-703X
    Published: Elsevier B.V 01.05.2021
    Published in Computer communications (01.05.2021)
    “…With the rapid development of Internet of Things (IoT), a new paradigm named Mobile Edge Computing (MEC) is proposed to push the cloud computing to the edge…”
    Get full text
    Journal Article
  16. 16

    BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection by Jiang, Shuai, Fu, Cai, He, Shuai, Lv, Jianqiang, Han, Lansheng, Hu, Hong

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.10.2024
    Published in IEEE transactions on software engineering (01.10.2024)
    “…Binary Code Similarity Detection (BCSD) is a fundamental binary analysis technique in the area of software security. Recently, advanced deep learning…”
    Get full text
    Journal Article
  17. 17

    Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network by Cheng, Yuan, Cui, Baojiang, Chen, Chen, Baker, Thar, Qi, Tao

    ISSN: 0140-3664, 1873-703X
    Published: Elsevier B.V 01.01.2023
    Published in Computer communications (01.01.2023)
    “…Automatic static vulnerability analysis for IoT devices is always an important and challenging research problem. Traditional vulnerability finding methods are…”
    Get full text
    Journal Article
  18. 18

    Semantics-aware obfuscation scheme prediction for binary by Zhao, Yujie, Tang, Zhanyong, Ye, Guixin, Peng, Dongxu, Fang, Dingyi, Chen, Xiaojiang, Wang, Zheng

    ISSN: 0167-4048, 1872-6208
    Published: Elsevier Ltd 01.12.2020
    Published in Computers & security (01.12.2020)
    “…By restoring the program into an easier understandable form, deobfuscation is an important technique for detecting and analyzing malicious software. To enable…”
    Get full text
    Journal Article
  19. 19

    R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries by Fan, Yongming, Biswas, Priyam, Garman, Christina

    ISSN: 2576-9103
    Published: IEEE 09.12.2024
    “…Cryptographic functions are instrumental in securing our electronic communications and systems; yet time and time again they are mis-used, mis-implemented, or…”
    Get full text
    Conference Proceeding
  20. 20

    Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis by Van den Herrewegen, Jan, Oswald, David, Garcia, Flavio D., Temeiza, Qais

    ISSN: 2569-2925, 2569-2925
    Published: Ruhr-Universität Bochum 03.12.2020
    “…The bootloader of an embedded microcontroller is responsible for guarding the device’s internal (flash) memory, enforcing read/write protection mechanisms…”
    Get full text
    Journal Article