Výsledky vyhledávání - Program and binary analysis

Upřesnit hledání
  1. 1

    Robust Binary Program Debloating Autor DING Duo, SUN Cong, ZHENG Tao

    ISSN: 1002-137X
    Vydáno: Editorial office of Computer Science 01.10.2024
    Vydáno v Ji suan ji ke xue (01.10.2024)
    “… attacks.Binary program debloating can identify and remove the redundant code based on the binary analysis of the application,so as to reduce the attack…”
    Získat plný text
    Journal Article
  2. 2

    D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling Autor Ye, Yapeng, Zhang, Zhuo, Shi, Qingkai, Aafer, Yousra, Zhang, Xiangyu

    ISSN: 2375-1207
    Vydáno: IEEE 01.05.2023
    “…ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly…”
    Získat plný text
    Konferenční příspěvek
  3. 3

    DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing Autor Ammann, Max, Hirschi, Lucca, Kremer, Steve

    ISSN: 2375-1207
    Vydáno: IEEE 19.05.2024
    “…Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of…”
    Získat plný text
    Konferenční příspěvek
  4. 4
  5. 5

    Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks Autor Wiebing, Sander, Giuffrida, Cristiano

    ISSN: 2375-1207
    Vydáno: IEEE 12.05.2025
    “…Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers…”
    Získat plný text
    Konferenční příspěvek
  6. 6

    Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis Autor Lu, Hui, Jin, Chengjie, Helu, Xiaohan, Zhang, Man, Sun, Yanbin, Han, Yi, Tian, Zhihong

    ISSN: 1383-469X, 1572-8153
    Vydáno: New York Springer US 01.08.2021
    Vydáno v Mobile networks and applications (01.08.2021)
    “…How to efficiently and reasonably analyze binary programs has always been the primary issue in the field of software security…”
    Získat plný text
    Journal Article
  7. 7

    SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs Autor Wang, Wenjie, Tian, Donghai, Ma, Rui, Wei, Hang, Ying, Qianjin, Jia, Xiaoqi, Zuo, Lei

    ISSN: 1673-5447
    Vydáno: China Institute of Communications 01.08.2021
    Vydáno v China communications (01.08.2021)
    “… Based on this observation, we propose a hybrid fuzzing method assisted by static analysis for binary programs…”
    Získat plný text
    Journal Article
  8. 8

    Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study Autor Xue, Hongfa, Sun, Shaowen, Venkataramani, Guru, Lan, Tian

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2019
    Vydáno v IEEE access (2019)
    “… To meet these challenges, machine learning-based binary code analysis frameworks attract substantial attention due to their automated feature extraction and drastically reduced efforts needed on large-scale programs…”
    Získat plný text
    Journal Article
  9. 9

    THE MAGELLAN PFS PLANET SEARCH PROGRAM: RADIAL VELOCITY AND STELLAR ABUNDANCE ANALYSES OF THE 360 au, METAL-POOR BINARY “TWINS” HD 133131A & B Autor Teske, Johanna K., Shectman, Stephen A., Vogt, Steve S., Díaz, Matías, Butler, R. Paul, Crane, Jeffrey D., Thompson, Ian B., Arriagada, Pamela

    ISSN: 0004-6256, 1538-3881, 1538-3881
    Vydáno: United States 01.12.2016
    Vydáno v The Astronomical journal (01.12.2016)
    “…We present a new precision radial velocity (RV) data set that reveals multiple planets orbiting the stars in the ∼360 au, G2+G2 “twin” binary HD 133131AB…”
    Získat plný text
    Journal Article
  10. 10

    Static Analysis of JNI Programs via Binary Decompilation Autor Park, Jihee, Lee, Sungho, Hong, Jaemin, Ryu, Sukyoung

    ISSN: 0098-5589, 1939-3520
    Vydáno: New York IEEE 01.05.2023
    “… Unfortunately, such source code analysis is not applicable to compiled JNI programs that are not open-sourced or open-source JNI programs containing third-party binary libraries…”
    Získat plný text
    Journal Article
  11. 11

    Empirical Study of Software Composition Analysis Tools for C/C++ Binary Programs Autor Ning, Yuqiao, Zhang, Yanan, Ma, Chao, Guo, Zhen, Yu, Longhai

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2024
    Vydáno v IEEE access (2024)
    “… To this end, this paper presents a comprehensive evaluation of software composition analysis techniques for accurately identifying components in C/C++ binary programs…”
    Získat plný text
    Journal Article
  12. 12

    Bin2vec: learning representations of binary executable programs for security tasks Autor Arakelyan, Shushan, Arasteh, Sima, Hauser, Christophe, Kline, Erik, Galstyan, Aram

    ISSN: 2523-3246, 2523-3246
    Vydáno: Singapore Springer Singapore 01.07.2021
    Vydáno v Cybersecurity (Singapore) (01.07.2021)
    “…Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts…”
    Získat plný text
    Journal Article
  13. 13

    Dynamic Program Analysis Enhanced Binary Recompilation Autor Parzefall, Fabian

    ISBN: 9798383592724
    Vydáno: ProQuest Dissertations & Theses 01.01.2024
    “…Users of proprietary and/or legacy programs without vendor support are denied the significant advances in compiler technologies of the past decades…”
    Získat plný text
    Dissertation
  14. 14

    A program for fractal and multifractal analysis of two-dimensional binary images: Computer algorithms versus mathematical theory Autor Perrier, Edith, Tarquis, Ana M., Dathe, Annette

    ISSN: 0016-7061, 1872-6259
    Vydáno: Amsterdam Elsevier B.V 01.10.2006
    Vydáno v Geoderma (01.10.2006)
    “…In this paper we present a tool to carry out the multifractal analysis of binary, two-dimensional images through the calculation of the Rényi D( q…”
    Získat plný text
    Journal Article Konferenční příspěvek
  15. 15

    MIL: A language to build program analysis tools through static binary instrumentation Autor Charif-Rubial, Andres S., Barthou, Denis, Valensi, Cedric, Shende, Sameer, Malony, Allen, Jalby, William

    ISSN: 1094-7256
    Vydáno: IEEE 01.12.2013
    “… Instrumentation techniques, through the insertion of code directly into binaries, are essential for program analyses used in debugging, runtime profiling, and performance evaluation…”
    Získat plný text
    Konferenční příspěvek
  16. 16

    Characterization of runtime resource usage from analysis of binary executable programs Autor de Souza Pinto, Renê, Botazzo Delbem, Alexandre Claudio, Monaco, Francisco José

    ISSN: 1568-4946, 1872-9681
    Vydáno: Elsevier B.V 01.10.2018
    Vydáno v Applied soft computing (01.10.2018)
    “…[Display omitted] •A method is proposed to characterize a computer program's runtime resource usage from the analysis of its binary executable file…”
    Získat plný text
    Journal Article
  17. 17

    Binary Diffing as a Network Alignment Problem via Belief Propagation Autor Mengin, Elie, Rossi, Fabrice

    ISSN: 2643-1572
    Vydáno: IEEE 01.11.2021
    “…In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing…”
    Získat plný text
    Konferenční příspěvek
  18. 18

    Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions Autor Hu, Yikun, Zhang, Yuanyuan, Gu, Dawu

    ISSN: 2169-3536, 2169-3536
    Vydáno: Piscataway IEEE 2019
    Vydáno v IEEE access (2019)
    “…The security of binary programs is significantly threatened by software vulnerabilities…”
    Získat plný text
    Journal Article
  19. 19

    DeMal: Module decomposition of malware based on community discovery Autor Huang, Yuyao, Shu, Hui, Kang, Fei

    ISSN: 0167-4048, 1872-6208
    Vydáno: Amsterdam Elsevier Ltd 01.06.2022
    Vydáno v Computers & security (01.06.2022)
    “… While existing static or dynamic analysis techniques can meet the common user needs for malware detection, analysts desire a more detailed overview to uncover the program architecture…”
    Získat plný text
    Journal Article
  20. 20

    Timing Analysis of Binary Programs with UPPAAL Autor Cassez, Franck, Bechennec, Jean-Luc

    ISSN: 1550-4808
    Vydáno: IEEE 01.07.2013
    “…We address the problem of computing accurate Worst-Case Execution Time (WCET). We propose a fully automatic and modular methodology based on program slicing and real-time model-checking…”
    Získat plný text
    Konferenční příspěvek