A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Opportunities and challenges in code search tools
Code search is a core software engineering task. Effective code search tools can help
developers substantially improve their software development efficiency and effectiveness. In …
developers substantially improve their software development efficiency and effectiveness. In …
Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …
security. It is especially important to localize the vulnerable functions among the source code …
How machine learning is solving the binary function similarity problem
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Hawkeye: Towards a desired directed grey-box fuzzer
Grey-box fuzzing is a practically effective approach to test real-world programs. However,
most existing grey-box fuzzers lack directedness, ie the capability of executing towards user …
most existing grey-box fuzzers lack directedness, ie the capability of executing towards user …
Asteria: Deep learning-based AST-encoding for cross-platform binary code similarity detection
S Yang, L Cheng, Y Zeng, Z Lang… - 2021 51st Annual …, 2021 - ieeexplore.ieee.org
Binary code similarity detection is a fundamental technique for many security applications
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
such as vulnerability search, patch analysis, and malware detection. There is an increasing …
Code search based on context-aware code translation
Code search is a widely used technique by developers during software development. It
provides semantically similar implementations from a large code corpus to developers …
provides semantically similar implementations from a large code corpus to developers …
Revisiting binary code similarity analysis using interpretable feature engineering and lessons learned
Binary code similarity analysis (BCSA) is widely used for diverse security applications,
including plagiarism detection, software license violation detection, and vulnerability …
including plagiarism detection, software license violation detection, and vulnerability …
Patch based vulnerability matching for binary programs
The binary-level function matching has been widely used to detect whether there are 1-day
vulnerabilities in released programs. However, the high false positive is a challenge for …
vulnerabilities in released programs. However, the high false positive is a challenge for …
ModX: binary level partially imported third-party library detection via program modularization and semantic matching
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …
popular. The prosperity of the library usage has provided the software engineers with a …