Search Results - binary code analysis

Refine Results
  1. 1

    Binary Code Analysis by Liu, Kaiping, Tan, Hee Beng Kuan, Chen, Xu

    ISSN: 0018-9162, 1558-0814
    Published: New York, NY IEEE 01.08.2013
    Published in Computer (Long Beach, Calif.) (01.08.2013)
    “…Static and dynamic analysis of binary code can provide useful information to security researchers without access to assembly code…”
    Get full text
    Journal Article
  2. 2

    Unleashing the power of pseudo-code for binary code similarity analysis by Zhang, Weiwei, Xu, Zhengzi, Xiao, Yang, Xue, Yinxing

    ISSN: 2523-3246, 2523-3246
    Published: Singapore Springer Nature Singapore 01.12.2022
    Published in Cybersecurity (Singapore) (01.12.2022)
    “… Since the source code of the software is difficult to obtain under most circumstances, binary-level code similarity analysis (BCSA…”
    Get full text
    Journal Article
  3. 3

    Identifying obfuscated code through graph-based semantic analysis of binary code by Cohen, Roxane, David, Robin, Yger, Florian, Rossi, Fabrice

    ISSN: 2364-8228, 2364-8228
    Published: Cham Springer International Publishing 01.12.2025
    Published in Applied network science (01.12.2025)
    “…Protecting sensitive program content is a critical concern in various situations, ranging from legitimate use cases to unethical contexts. Obfuscation is one…”
    Get full text
    Journal Article
  4. 4

    Revisiting Binary Code Similarity Analysis Using Interpretable Feature Engineering and Lessons Learned by Kim, Dongkwan, Kim, Eunsoo, Cha, Sang Kil, Son, Sooel, Kim, Yongdae

    ISSN: 0098-5589, 1939-3520
    Published: New York IEEE 01.04.2023
    Published in IEEE transactions on software engineering (01.04.2023)
    “…Binary code similarity analysis (BCSA) is widely used for diverse security applications, including plagiarism detection, software license violation detection, and vulnerability discovery…”
    Get full text
    Journal Article
  5. 5

    Binary Code Analysis for Cybersecurity: A Systematic Review of Forensic Techniques in Vulnerability Detection and Anti-Evasion Strategies by Javed, Haseeb, Ali, Farman, Shah, Babar, Kwak, Daehan

    ISSN: 2169-3536, 2169-3536
    Published: Piscataway IEEE 2025
    Published in IEEE access (2025)
    “…Binary code analysis is essential in modern cybersecurity, examining compiled program outputs to identify vulnerabilities, detect malware, and ensure software security compliance…”
    Get full text
    Journal Article
  6. 6

    BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching by Jiang, Ling, An, Junwen, Huang, Huihui, Tang, Qiyi, Nie, Sen, Wu, Shi, Zhang, Yuqun

    ISSN: 1558-1225
    Published: ACM 12.04.2024
    “… As one of the mainstream SCA techniques, binary-to-source SCA identifies the third-party source projects contained in binary files via binary source code matching, which is a major challenge…”
    Get full text
    Conference Proceeding
  7. 7

    Binary code similarity analysis based on naming function and common vector space by Xia, Bing, Pang, Jianmin, Zhou, Xin, Shan, Zheng, Wang, Junchao, Yue, Feng

    ISSN: 2045-2322, 2045-2322
    Published: London Nature Publishing Group UK 21.09.2023
    Published in Scientific reports (21.09.2023)
    “…Binary code similarity analysis is widely used in the field of vulnerability search where source code may not be available to detect whether two binary functions are similar…”
    Get full text
    Journal Article
  8. 8

    IFAttn: Binary code similarity analysis based on interpretable features with attention by Jiang, Shuai, Fu, Cai, Qian, Yekui, He, Shuai, Lv, Jianqiang, Han, Lansheng

    ISSN: 0167-4048
    Published: Elsevier Ltd 01.09.2022
    Published in Computers & security (01.09.2022)
    “…Binary code similarity analysis (BCSA11BCSA: Binary Code Similarity Analysis.) is meaningful in various software security applications, including vulnerability discovery, clone detection, and malware detection…”
    Get full text
    Journal Article
  9. 9

    Next-Generation Intermediate Representations for Binary Code Analysis by Solovev, M. A., Bakulin, M. G., Gorbachev, M. S., Manushin, D. V., Padaryan, V. A., Panasenko, S. S.

    ISSN: 0361-7688, 1608-3261
    Published: Moscow Pleiades Publishing 01.12.2019
    Published in Programming and computer software (01.12.2019)
    “…Many binary code analysis tools rely on intermediate representation (IR) derived from a binary code, instead of working directly with machine instructions…”
    Get full text
    Journal Article
  10. 10

    GBsim: A Robust GCN-BERT Approach for Cross-Architecture Binary Code Similarity Analysis by Du, Jiang, Wei, Qiang, Wang, Yisen, Bai, Xingyu

    ISSN: 1099-4300, 1099-4300
    Published: Switzerland MDPI AG 07.04.2025
    Published in Entropy (Basel, Switzerland) (07.04.2025)
    “… Nevertheless, practical deployments in mission-critical scenarios such as binary code similarity detection face two fundamental obstacles…”
    Get full text
    Journal Article
  11. 11

    A Review of Deep Learning-Based Binary Code Similarity Analysis by Du, Jiang, Wei, Qiang, Wang, Yisen, Sun, Xiangjie

    ISSN: 2079-9292, 2079-9292
    Published: Basel MDPI AG 01.11.2023
    Published in Electronics (Basel) (01.11.2023)
    “… However, improper code citation could lead to security risks and license issues. With the source codes of many pieces of software being difficult to obtain, binary code similarity analysis (BCSA…”
    Get full text
    Journal Article
  12. 12

    Next generation intermediate representations for binary code analysis by Solovev, M.A., Bakulin, M.G., Gorbachev, M.S., Manushin, D.V., Padaryan, V.A., Panasenko, S.S.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.02.2019
    “…A lot of binary code analysis tools do not work directly with machine instructions, instead relying on an intermediate representation from the binary code…”
    Get full text
    Journal Article
  13. 13

    Methods and software tools for combined binary code analysis by Padaryan, V.A., Getman, A.I., Solovyev, M.A., Bakulin, M.G., Borzilov, A.I., Kaushan, V.V., Ledovskich, I.N., Markin, U.V., Panasenko, S.S.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…This paper presents methods and tools for binary code analysis that have been developed in ISP RAS and their applications in fields of algorithm and data format recovery…”
    Get full text
    Journal Article
  14. 14

    Application of software emulators for the binary code analysis by Dovgalyuk, P.M., Makarov, V.A., Padaryan, V.A., Romaneev, M.S., Fursova, N.I.

    ISSN: 2079-8156, 2220-6426
    Published: Russian Academy of Sciences, Ivannikov Institute for System Programming 01.10.2018
    “…The article presents the experience of using software emulators as a tool for dynamic analysis of binary code…”
    Get full text
    Journal Article
  15. 15

    Bin2Vec: Interpretable and Auditable Multi-View Binary Analysis for Code Plagiarism Detection by Moussaoui, Moussa, Houichime, Tarik, Sadiq, Abdelalim

    ISSN: 2771-7402
    Published: IEEE 03.12.2025
    “… Bin2Vec acts as a bridge between binary representations and machine learning techniques by generating feature representations that can be…”
    Get full text
    Conference Proceeding
  16. 16

    KEENHash: Hashing Programs into Function-Aware Embeddings for Large-Scale Binary Code Similarity Analysis by Liu, Zhijie, Tang, Qiyi, Nie, Sen, Wu, Shi, Zhang, Liang Feng, Tang, Yutian

    ISSN: 2994-970X, 2994-970X
    Published: New York, NY, USA ACM 22.06.2025
    “…Binary code similarity analysis (BCSA) is a crucial research area in many fields such as cybersecurity…”
    Get full text
    Journal Article
  17. 17

    A data type inference method based on long short-term memory by improved feature for weakness analysis in binary code by Jeong, Junho, Lim, Joong Yeon, Son, Yunsik

    ISSN: 0167-739X, 1872-7115
    Published: Elsevier B.V 01.11.2019
    Published in Future generation computer systems (01.11.2019)
    “… Therefore, reconstructing the variables used and the data type information of the variables from binary code is the most important step in weak point analysis…”
    Get full text
    Journal Article
  18. 18

    Scalable Dynamic Analysis of Binary Code by Kargén, Ulf

    Published: Linköping Linkopings Universitet 2019
    Get full text
    eBook
  19. 19

    Cross-Platform Binary Code Homology Analysis Based on GRU Graph Embedding by Wang, Shen, Jiang, Xunzhi, Yu, Xiangzhan, Su, Xiaohui

    ISSN: 1939-0114, 1939-0122
    Published: London Hindawi 18.12.2021
    Published in Security and communication networks (18.12.2021)
    “…Binary code homology analysis refers to detecting whether two pieces of binary code are compiled from the same piece of source code, which is a fundamental technique for many security applications…”
    Get full text
    Journal Article
  20. 20

    Identifying runtime libraries in statically linked linux binaries by Carrillo-Mondéjar, Javier, Rodríguez, Ricardo J.

    ISSN: 0167-739X
    Published: Elsevier B.V 01.03.2025
    Published in Future generation computer systems (01.03.2025)
    “… that have been updated to fix any vulnerability. Despite this, malware binaries are often statically linked to ensure they run on target platforms and to complicate malware analysis…”
    Get full text
    Journal Article