A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Opportunities and challenges in code search tools

C Liu, X **a, D Lo, C Gao, X Yang… - ACM Computing Surveys …, 2021 - dl.acm.org
Code search is a core software engineering task. Effective code search tools can help
developers substantially improve their software development efficiency and effectiveness. In …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Hawkeye: Towards a desired directed grey-box fuzzer

H Chen, Y Xue, Y Li, B Chen, X **e, X Wu… - Proceedings of the 2018 …, 2018 - dl.acm.org
Grey-box fuzzing is a practically effective approach to test real-world programs. However,
most existing grey-box fuzzers lack directedness, ie the capability of executing towards user …

Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection

S Yang, L Cheng, Y Zeng, Z Lang… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Binary code similarity detection is a fundamental technique for many security applications
such as vulnerability search, patch analysis, and malware detection. There is an increasing …

Code search based on context-aware code translation

W Sun, C Fang, Y Chen, G Tao, T Han… - Proceedings of the 44th …, 2022 - dl.acm.org
Code search is a widely used technique by developers during software development. It
provides semantically similar implementations from a large code corpus to developers …

Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned

D Kim, E Kim, SK Cha, S Son… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …

Patch based vulnerability matching for binary programs

Y Xu, Z Xu, B Chen, F Song, Y Liu, T Liu - Proceedings of the 29th ACM …, 2020 - dl.acm.org
The binary-level function matching has been widely used to detect whether there are 1-day
vulnerabilities in released programs. However, the high false positive is a challenge for …

ModX: binary level partially imported third-party library detection via program modularization and semantic matching

C Yang, Z Xu, H Chen, Y Liu, X Gong… - Proceedings of the 44th …, 2022 - dl.acm.org
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …