Výsledky vyhledávání - Program and binary analysis
-
1
Robust Binary Program Debloating
ISSN: 1002-137XVydáno: Editorial office of Computer Science 01.10.2024Vydáno v Ji suan ji ke xue (01.10.2024)“… attacks.Binary program debloating can identify and remove the redundant code based on the binary analysis of the application,so as to reduce the attack…”
Získat plný text
Journal Article -
2
D-ARM: Disassembling ARM Binaries by Lightweight Superset Instruction Interpretation and Graph Modeling
ISSN: 2375-1207Vydáno: IEEE 01.05.2023Vydáno v Proceedings - IEEE Symposium on Security and Privacy (01.05.2023)“…ARM binary analysis has a wide range of applications in ARM system security. A fundamental challenge is ARM disassembly…”
Získat plný text
Konferenční příspěvek -
3
DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing
ISSN: 2375-1207Vydáno: IEEE 19.05.2024Vydáno v Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of…”
Získat plný text
Konferenční příspěvek -
4
"Len or index or count, anything but v1": Predicting Variable Names in Decompilation Output with Transfer Learning
ISSN: 2375-1207Vydáno: IEEE 19.05.2024Vydáno v Proceedings - IEEE Symposium on Security and Privacy (19.05.2024)“…Binary reverse engineering is an arduous and tedious task performed by skilled and expensive human analysts…”
Získat plný text
Konferenční příspěvek -
5
Training Solo: On the Limitations of Domain Isolation Against Spectre-v2 Attacks
ISSN: 2375-1207Vydáno: IEEE 12.05.2025Vydáno v Proceedings - IEEE Symposium on Security and Privacy (12.05.2025)“…Spectre-v2 vulnerabilities have been increasingly gaining momentum, as they enable particularly powerful cross-domain transient execution attacks. Attackers…”
Získat plný text
Konferenční příspěvek -
6
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis
ISSN: 1383-469X, 1572-8153Vydáno: New York Springer US 01.08.2021Vydáno v Mobile networks and applications (01.08.2021)“…How to efficiently and reasonably analyze binary programs has always been the primary issue in the field of software security…”
Získat plný text
Journal Article -
7
SHFuzz: A hybrid fuzzing method assisted by static analysis for binary programs
ISSN: 1673-5447Vydáno: China Institute of Communications 01.08.2021Vydáno v China communications (01.08.2021)“… Based on this observation, we propose a hybrid fuzzing method assisted by static analysis for binary programs…”
Získat plný text
Journal Article -
8
Machine Learning-Based Analysis of Program Binaries: A Comprehensive Study
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2019Vydáno v IEEE access (2019)“… To meet these challenges, machine learning-based binary code analysis frameworks attract substantial attention due to their automated feature extraction and drastically reduced efforts needed on large-scale programs…”
Získat plný text
Journal Article -
9
THE MAGELLAN PFS PLANET SEARCH PROGRAM: RADIAL VELOCITY AND STELLAR ABUNDANCE ANALYSES OF THE 360 au, METAL-POOR BINARY “TWINS” HD 133131A & B
ISSN: 0004-6256, 1538-3881, 1538-3881Vydáno: United States 01.12.2016Vydáno v The Astronomical journal (01.12.2016)“…We present a new precision radial velocity (RV) data set that reveals multiple planets orbiting the stars in the ∼360 au, G2+G2 “twin” binary HD 133131AB…”
Získat plný text
Journal Article -
10
Static Analysis of JNI Programs via Binary Decompilation
ISSN: 0098-5589, 1939-3520Vydáno: New York IEEE 01.05.2023Vydáno v IEEE transactions on software engineering (01.05.2023)“… Unfortunately, such source code analysis is not applicable to compiled JNI programs that are not open-sourced or open-source JNI programs containing third-party binary libraries…”
Získat plný text
Journal Article -
11
Empirical Study of Software Composition Analysis Tools for C/C++ Binary Programs
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2024Vydáno v IEEE access (2024)“… To this end, this paper presents a comprehensive evaluation of software composition analysis techniques for accurately identifying components in C/C++ binary programs…”
Získat plný text
Journal Article -
12
Bin2vec: learning representations of binary executable programs for security tasks
ISSN: 2523-3246, 2523-3246Vydáno: Singapore Springer Singapore 01.07.2021Vydáno v Cybersecurity (Singapore) (01.07.2021)“…Tackling binary program analysis problems has traditionally implied manually defining rules and heuristics, a tedious and time consuming task for human analysts…”
Získat plný text
Journal Article -
13
Dynamic Program Analysis Enhanced Binary Recompilation
ISBN: 9798383592724Vydáno: ProQuest Dissertations & Theses 01.01.2024“…Users of proprietary and/or legacy programs without vendor support are denied the significant advances in compiler technologies of the past decades…”
Získat plný text
Dissertation -
14
A program for fractal and multifractal analysis of two-dimensional binary images: Computer algorithms versus mathematical theory
ISSN: 0016-7061, 1872-6259Vydáno: Amsterdam Elsevier B.V 01.10.2006Vydáno v Geoderma (01.10.2006)“…In this paper we present a tool to carry out the multifractal analysis of binary, two-dimensional images through the calculation of the Rényi D( q…”
Získat plný text
Journal Article Konferenční příspěvek -
15
MIL: A language to build program analysis tools through static binary instrumentation
ISSN: 1094-7256Vydáno: IEEE 01.12.2013Vydáno v 20th Annual International Conference on High Performance Computing (01.12.2013)“… Instrumentation techniques, through the insertion of code directly into binaries, are essential for program analyses used in debugging, runtime profiling, and performance evaluation…”
Získat plný text
Konferenční příspěvek -
16
Characterization of runtime resource usage from analysis of binary executable programs
ISSN: 1568-4946, 1872-9681Vydáno: Elsevier B.V 01.10.2018Vydáno v Applied soft computing (01.10.2018)“…[Display omitted] •A method is proposed to characterize a computer program's runtime resource usage from the analysis of its binary executable file…”
Získat plný text
Journal Article -
17
Binary Diffing as a Network Alignment Problem via Belief Propagation
ISSN: 2643-1572Vydáno: IEEE 01.11.2021Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (01.11.2021)“…In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing…”
Získat plný text
Konferenční příspěvek -
18
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions
ISSN: 2169-3536, 2169-3536Vydáno: Piscataway IEEE 2019Vydáno v IEEE access (2019)“…The security of binary programs is significantly threatened by software vulnerabilities…”
Získat plný text
Journal Article -
19
DeMal: Module decomposition of malware based on community discovery
ISSN: 0167-4048, 1872-6208Vydáno: Amsterdam Elsevier Ltd 01.06.2022Vydáno v Computers & security (01.06.2022)“… While existing static or dynamic analysis techniques can meet the common user needs for malware detection, analysts desire a more detailed overview to uncover the program architecture…”
Získat plný text
Journal Article -
20
Timing Analysis of Binary Programs with UPPAAL
ISSN: 1550-4808Vydáno: IEEE 01.07.2013Vydáno v Proceedings / International Conference on Application of Concurrency to System Design (01.07.2013)“…We address the problem of computing accurate Worst-Case Execution Time (WCET). We propose a fully automatic and modular methodology based on program slicing and real-time model-checking…”
Získat plný text
Konferenční příspěvek

