Výsledky vyhledávání - "binary code analysis"

  1. 1

    Identifying runtime libraries in statically linked linux binaries Autor Carrillo-Mondéjar, Javier, Rodríguez, Ricardo J.

    ISSN: 0167-739X
    Vydáno: Elsevier B.V 01.03.2025
    Vydáno v Future generation computer systems (01.03.2025)
    “…Vulnerabilities in unpatched applications can originate from third-party dependencies in statically linked applications, as they must be relinked each time to…”
    Získat plný text
    Journal Article
  2. 2

    GENDA: A Graph Embedded Network Based Detection Approach on encryption algorithm of binary program Autor Li, Xiao, Chang, Yuanhai, Ye, Guixin, Gong, Xiaoqing, Tang, Zhanyong

    ISSN: 2214-2126
    Vydáno: Elsevier Ltd 01.03.2022
    “…The cryptographic techniques are commonly used in software protection against malicious re-engineering. How to efficiently detect encryption algorithms used in…”
    Získat plný text
    Journal Article
  3. 3

    Binary code traceability of multigranularity information fusion from the perspective of software genes Autor Huang, Yizhao, Qiao, Meng, Liu, Fudong, Li, Xingwei, Gui, Hairen, Zhang, Chunyan

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.03.2022
    Vydáno v Computers & security (01.03.2022)
    “…Binary code traceability aims to use the relevant characteristics of anonymous binary codes to identify concealed authors or teams and replace error-prone and…”
    Získat plný text
    Journal Article
  4. 4

    SELF: A method of searching for library functions in stripped binary code Autor Liu, Xueqian, Cao, Shoufeng, Cao, Zhenzhong, Gao, Qu, Wan, Lin, Wang, Fengyu

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.12.2021
    Vydáno v Computers & security (01.12.2021)
    “…•A novel scheme named SELF was proposed to recognize library functions used in stripped binary code. The key of SELF is combining the co-occurrence matrix and…”
    Získat plný text
    Journal Article
  5. 5

    CPA: Accurate Cross-Platform Binary Authorship Characterization Using LDA Autor Alrabaee, Saed, Debbabi, Mourad, Wang, Lingyu

    ISSN: 1556-6013
    Vydáno: IEEE 2020
    “…Binary authorship characterization refers to the process of identifying stylistic characteristics that are related to the author of an anonymous binary code…”
    Získat plný text
    Journal Article
  6. 6

    Compiler-provenance identification in obfuscated binaries using vision transformers Autor Khan, Wasif, Alrabaee, Saed, Al-kfairy, Mousa, Tang, Jie, Raymond Choo, Kim-Kwang

    ISSN: 2666-2817
    Vydáno: Elsevier Ltd 01.07.2024
    “…Extracting compiler-provenance-related information (e.g., the source of a compiler, its version, its optimization settings, and compiler-related functions) is…”
    Získat plný text
    Journal Article
  7. 7

    About Methods for Extracting Algorithms from Binary Code Autor Kulagin, I. I., Padaryan, V. A., Koshkin, V. A.

    ISSN: 0361-7688, 1608-3261
    Vydáno: Moscow Pleiades Publishing 01.12.2025
    Vydáno v Programming and computer software (01.12.2025)
    “…This paper proposes an iterative method for extracting algorithms from binary code and constructing their high-level representation. The construction of…”
    Získat plný text
    Journal Article
  8. 8

    Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling Autor Tian, Zhenzhou, Huang, Yaqian, Xie, Borun, Chen, Yanping, Chen, Lingwei, Wu, Dinghao

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2021
    Vydáno v IEEE access (2021)
    “…Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details…”
    Získat plný text
    Journal Article
  9. 9

    基于约束推导式的增强型二进制漏洞挖掘 Autor 郑建云, 庞建民, 周鑫, 王军

    ISSN: 1002-137X
    Vydáno: 数学工程与先进计算国家重点实验室 郑州 450002 15.03.2021
    Vydáno v 计算机科学 (15.03.2021)
    “…TP311; 近年来,使用软件相似性方法挖掘软件中的同源漏洞已经被证明确实有效,但现有的方法在准确率方面还存在一定不足.在原有的软件相似性方法的基础上,文中提出了一种基于…”
    Získat plný text
    Journal Article
  10. 10

    A Survey of Binary Code Similarity Detection Techniques Autor Ruan, Liting, Xu, Qizhen, Zhu, Shunzhi, Huang, Xujing, Lin, Xinyang

    ISSN: 2079-9292, 2079-9292
    Vydáno: Basel MDPI AG 01.05.2024
    Vydáno v Electronics (Basel) (01.05.2024)
    “…Binary Code Similarity Detection is a method that involves comparing two or more binary code segments to identify their similarities and differences. This…”
    Získat plný text
    Journal Article
  11. 11

    Disassemble Byte Sequence Using Graph Attention Network Autor Qiu, Jing, Dong, Feng, Sun, Guanglu

    ISSN: 0948-695X, 0948-6968
    Vydáno: Bristol Pensoft Publishers 28.07.2022
    “…Disassembly is the basis of static analysis of binary code and is used in malicious code detection, vulnerability mining, software optimization, etc…”
    Získat plný text
    Journal Article
  12. 12

    Improved Algorithm for the Network Alignment Problem with Application to Binary Diffing Autor Mengin, Elie, Rossi, Fabrice

    ISSN: 1877-0509, 1877-0509
    Vydáno: Elsevier B.V 2021
    Vydáno v Procedia computer science (2021)
    “…In this paper, we present a novel algorithm to address the Network Alignment problem. It is inspired from a previous message passing framework of Bayati et al…”
    Získat plný text
    Journal Article
  13. 13

    Binary Code Analysis Autor Liu, Kaiping, Tan, Hee Beng Kuan, Chen, Xu

    ISSN: 0018-9162, 1558-0814
    Vydáno: New York, NY IEEE 01.08.2013
    Vydáno v Computer (Long Beach, Calif.) (01.08.2013)
    “…Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code. However, these approaches…”
    Získat plný text
    Journal Article
  14. 14

    Approach for estimating similarity between procedures in differently compiled binaries Autor Stojanovic, Sasa, Radivojevic, Zaharije, Cvetanovic, Milos

    ISSN: 0950-5849, 1873-6025
    Vydáno: Amsterdam Elsevier B.V 01.02.2015
    Vydáno v Information and software technology (01.02.2015)
    “…•New software metrics based approach for detecting software clones in binary codes.•Use of new metrics immune to syntactical changes introduced by different…”
    Získat plný text
    Journal Article
  15. 15

    A Hybrid Approach for Control Flow Graph Construction from Binary Code Autor Minh Hai Nguyen, Thien Binh Nguyen, Thanh Tho Quan, Ogawa, Mizuhito

    ISSN: 1530-1362
    Vydáno: IEEE 01.12.2013
    “…Binary code analysis has attracted much attention. The difficulty lies in constructing a Control Flow Graph (CFG), which is dynamically generated and modified,…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    A Hybrid Transformer-LLM Pipeline for Function Name Recovery in Stripped Binaries Autor Petrache, Remus, Lemnaru, Camelia

    Vydáno: IEEE 04.08.2025
    “…Recovering meaningful function names from stripped executables is a difficult challenge in reverse engineer- ing and security analysis. Without debug symbols,…”
    Získat plný text
    Konferenční příspěvek
  17. 17

    Are We There Yet? Filling the Gap Between Binary Similarity Analysis and Binary Software Composition Analysis Autor Wang, Huaijin, Liu, Zhibo, Wang, Shuai, Wang, Ying, Tang, Qiyi, Nie, Sen, Wu, Shi

    ISSN: 2995-1356
    Vydáno: IEEE 08.07.2024
    “…Software composition analysis (SCA) has attracted the attention of the industry and academic community in recent years. Given a piece of program source code,…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    A Binary Cryptographic Algorithm Identification Method Based on Complementary Features Autor Guo, Yanhui, Dong, Hantao, Bian, Yu, Xu, Guosheng

    ISSN: 2837-7109
    Vydáno: IEEE 08.12.2023
    “…Abstract-The effective identification of binary cryptographic algorithms provides crucial technical support for encryption cracking and security mechanism…”
    Získat plný text
    Konferenční příspěvek
  19. 19

    Binary level toolchain provenance identification with graph neural networks Autor Benoit, Tristan, Marion, Jean-Yves, Bardin, Sebastien

    Vydáno: IEEE 01.03.2021
    “…We consider the problem of recovering the compiling chain used to generate a given stripped binary code. We present a Graph Neural Network framework at the…”
    Získat plný text
    Konferenční příspěvek
  20. 20

    A Method to Evaluate Binary Code Comparison Tools Autor Arutunian, Mariam, Hovhannisyan, Hripsime, Vardanyan, Vahagn, Sargsyan, Sevak, Kurmangaleev, Shamil, Aslanyan, Hayk

    Vydáno: IEEE 01.09.2021
    “…Binary code comparison tools are widely used to analyze vulnerabilities, search for malicious code, detect copyright violations, etc. The article discusses…”
    Získat plný text
    Konferenční příspěvek