Code search: A survey of techniques for finding code

L Di Grazia, M Pradel - ACM Computing Surveys, 2023 - dl.acm.org
The immense amounts of source code provide ample challenges and opportunities during
software development. To handle the size of code bases, developers commonly search for …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

code2vec: Learning distributed representations of code

U Alon, M Zilberstein, O Levy, E Yahav - Proceedings of the ACM on …, 2019 - dl.acm.org
We present a neural model for representing snippets of code as continuous distributed
vectors (``code embeddings''). The main idea is to represent a code snippet as a single fixed …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Neural network-based graph embedding for cross-platform binary code similarity detection

X Xu, C Liu, Q Feng, H Yin, L Song… - Proceedings of the 2017 …, 2017 - dl.acm.org
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …

Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization

SHH Ding, BCM Fung… - 2019 ieee symposium on …, 2019 - ieeexplore.ieee.org
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …

Scalable graph-based bug search for firmware images

Q Feng, R Zhou, C Xu, Y Cheng, B Testa… - Proceedings of the 2016 …, 2016 - dl.acm.org
Because of rampant security breaches in IoT devices, searching vulnerabilities in massive
IoT ecosystems is more crucial than ever. Recent studies have demonstrated that control …

Detecting vulnerability on IoT device firmware: A survey

X Feng, X Zhu, QL Han, W Zhou… - IEEE/CAA Journal of …, 2022 - ieeexplore.ieee.org
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …