Search Results - "binary code analysis"

Refine Results
  1. 1

    Binary Code Analysis by Liu, Kaiping, Tan, Hee Beng Kuan, Chen, Xu

    ISSN: 0018-9162, 1558-0814
    Published: New York, NY IEEE 01.08.2013
    Published in Computer (Long Beach, Calif.) (01.08.2013)
    “…Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code. However, these approaches…”
    Get full text
    Journal Article
  2. 2

    Binary Code Analysis for Cybersecurity: A Systematic Review of Forensic Techniques in Vulnerability Detection and Anti-Evasion Strategies by Javed, Haseeb, Ali, Farman, Shah, Babar, Kwak, Daehan

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2025
    Published in IEEE access (2025)
    “…Binary code analysis is essential in modern cybersecurity, examining compiled program outputs to identify vulnerabilities, detect malware, and ensure software security compliance…”
    Get full text
    Journal Article
  3. 3

    Next-Generation Intermediate Representations for Binary Code Analysis by Solovev, M. A., Bakulin, M. G., Gorbachev, M. S., Manushin, D. V., Padaryan, V. A., Panasenko, S. S.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.12.2019
    Published in Programming and computer software (01.12.2019)
    “…Many binary code analysis tools rely on intermediate representation (IR) derived from a binary code, instead of working directly with machine instructions…”
    Get full text
    Journal Article
  4. 4

    Next generation intermediate representations for binary code analysis by Solovev, M.A., Bakulin, M.G., Gorbachev, M.S., Manushin, D.V., Padaryan, V.A., Panasenko, S.S.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.02.2019
    “…A lot of binary code analysis tools do not work directly with machine instructions, instead relying on an intermediate representation from the binary code…”
    Get full text
    Journal Article
  5. 5

    Methods and software tools for combined binary code analysis by Padaryan, V.A., Getman, A.I., Solovyev, M.A., Bakulin, M.G., Borzilov, A.I., Kaushan, V.V., Ledovskich, I.N., Markin, U.V., Panasenko, S.S.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…This paper presents methods and tools for binary code analysis that have been developed in ISP RAS and their applications in fields of algorithm and data format recovery…”
    Get full text
    Journal Article
  6. 6

    Application of software emulators for the binary code analysis by Dovgalyuk, P.M., Makarov, V.A., Padaryan, V.A., Romaneev, M.S., Fursova, N.I.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…The article presents the experience of using software emulators as a tool for dynamic analysis of binary code: as a machine instruction tracer, and as a smart…”
    Get full text
    Journal Article
  7. 7

    Methods and software tools to support combined binary code analysis by Padaryan, V. A., Getman, A. I., Solovyev, M. A., Bakulin, M. G., Borzilov, A. I., Kaushan, V. V., Ledovskikh, I. N., Markin, Yu. V., Panasenko, S. S.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.09.2014
    Published in Programming and computer software (01.09.2014)
    “…Methods and tools for binary code analysis developed in the Institute of System Programming, Russian Academy of Sciences, and their applications in algorithm and data format recovery are considered…”
    Get full text
    Journal Article
  8. 8

    Identifying runtime libraries in statically linked linux binaries by Carrillo-Mondéjar, Javier, Rodríguez, Ricardo J.

    ISSN: 0167-739X
    Published: Elsevier B.V 01.03.2025
    Published in Future generation computer systems (01.03.2025)
    “…Vulnerabilities in unpatched applications can originate from third-party dependencies in statically linked applications, as they must be relinked each time to…”
    Get full text
    Journal Article
  9. 9

    An Instruction Embedding Model for Binary Code Analysis by Redmond, Kimberly Michelle

    ISBN: 1085612910, 9781085612913
    Published: ProQuest Dissertations & Theses 01.01.2019
    “…Binary code analysis is important for understanding programs without access to the original source code, which is common with proprietary software…”
    Get full text
    Dissertation
  10. 10

    Rampo: A CEGAR-based Integration of Binary Code Analysis and System Falsification for Cyber-Kinetic Vulnerability Detection by Tsujio, Kohei, Al Faruque, Mohammad Abdullah, Shoukry, Yasser

    Published: IEEE 13.05.2024
    “… This paper presents a novel tool, named Rampo, that can perform binary code analysis to identify cyber kinetic vulnerabilities in CPS…”
    Get full text
    Conference Proceeding
  11. 11

    GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program by Li, Xiao, Chang, Yuanhai, Ye, Guixin, Gong, Xiaoqing, Tang, Zhanyong

    ISSN: 2214-2126
    Published: Elsevier Ltd 01.03.2022
    “…The cryptographic techniques are commonly used in software protection against malicious re-engineering. How to efficiently detect encryption algorithms used in…”
    Get full text
    Journal Article
  12. 12

    Binary code traceability of multigranularity information fusion from the perspective of software genes by Huang, Yizhao, Qiao, Meng, Liu, Fudong, Li, Xingwei, Gui, Hairen, Zhang, Chunyan

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.03.2022
    Published in Computers & security (01.03.2022)
    “…Binary code traceability aims to use the relevant characteristics of anonymous binary codes to identify concealed authors or teams and replace error-prone and…”
    Get full text
    Journal Article
  13. 13

    SELF: A method of searching for library functions in stripped binary code by Liu, Xueqian, Cao, Shoufeng, Cao, Zhenzhong, Gao, Qu, Wan, Lin, Wang, Fengyu

    ISSN: 0167-4048, 1872-6208
    Published: Amsterdam Elsevier Ltd 01.12.2021
    Published in Computers & security (01.12.2021)
    “…•A novel scheme named SELF was proposed to recognize library functions used in stripped binary code. The key of SELF is combining the co-occurrence matrix and…”
    Get full text
    Journal Article
  14. 14

    CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA by Alrabaee, Saed, Debbabi, Mourad, Wang, Lingyu

    ISSN: 1556-6013
    Published: IEEE 2020
    “…Binary authorship characterization refers to the process of identifying stylistic characteristics that are related to the author of an anonymous binary code…”
    Get full text
    Journal Article
  15. 15

    Compiler-provenance identification in obfuscated binaries using vision transformers by Khan, Wasif, Alrabaee, Saed, Al-kfairy, Mousa, Tang, Jie, Raymond Choo, Kim-Kwang

    ISSN: 2666-2817
    Published: Elsevier Ltd 01.07.2024
    “…Extracting compiler-provenance-related information (e.g., the source of a compiler, its version, its optimization settings, and compiler-related functions) is…”
    Get full text
    Journal Article
  16. 16

    Parallel Binary Code Analysis by Meng, Xiaozhu, Anderson, Jonathon M, Mellor-Crummey, John, Krentel, Mark W, Miller, Barton P, Milaković, Srđan

    ISSN: 2331-8422
    Published: Ithaca Cornell University Library, arXiv.org 16.05.2020
    Published in arXiv.org (16.05.2020)
    “…Binary code analysis is widely used to assess a program's correctness, performance, and provenance…”
    Get full text
    Paper
  17. 17

    Network-Based Protocol Implementation Engineering and a Study on Machine Learning Based Binary Code Analysis by Sun, Shaowen

    ISBN: 1392166500, 9781392166505
    Published: ProQuest Dissertations & Theses 01.01.2019
    “… Besides, this paper also gives a comprehensive study of machine learning based binary code analysis to find the relationship between binary code and machine learning algorithm…”
    Get full text
    Dissertation
  18. 18

    About Methods for Extracting Algorithms from Binary Code by Kulagin, I. I., Padaryan, V. A., Koshkin, V. A.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.12.2025
    Published in Programming and computer software (01.12.2025)
    “…This paper proposes an iterative method for extracting algorithms from binary code and constructing their high-level representation. The construction of…”
    Get full text
    Journal Article
  19. 19

    Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling by Tian, Zhenzhou, Huang, Yaqian, Xie, Borun, Chen, Yanping, Chen, Lingwei, Wu, Dinghao

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2021
    Published in IEEE access (2021)
    “…Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details…”
    Get full text
    Journal Article
  20. 20

    Software Vulnerability Mining Technology of Shipbuilding Industry based on Dynamic Binary Code Analysis by Liu, Bojiang, Wu, Lijin, Shen, Xiaomei, He, Wei, Han, Xinyu

    ISSN: 2767-6684
    Published: IEEE 01.08.2022
    “… The impact and other information are studied from the dynamic binary code analysis method and the tracking and debugging model…”
    Get full text
    Conference Proceeding