A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …
significantly improve the performance of vulnerability detection. They represent code in …
Vulnerabilities and Security Patches Detection in OSS: A Survey
R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F **e… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …
widespread adoption, attributed to its openness and editability. However, this expansion has …
Practical binary code similarity detection with bert-based transferable similarity learning
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …
applications, including software plagiarism, malware classification, and known vulnerability …
ModX: binary level partially imported third-party library detection via program modularization and semantic matching
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …
popular. The prosperity of the library usage has provided the software engineers with a …
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention
Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …
software supply chain security. However, existing vulnerability detection methods based on …
Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking
Security patches play an important role in defending against the security threats brought by
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …
[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies
K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …
vulnerability databases have challenges in promptly sharing new security events with …
Precise and efficient patch presence test for android applications against code obfuscation
Third-party libraries (TPLs) are widely utilized by Android developers to implement new
apps. Unfortunately, TPLs are often suffering from various vulnerabilities, which could be …
apps. Unfortunately, TPLs are often suffering from various vulnerabilities, which could be …
Facilitating vulnerability assessment through poc migration
Recent research shows that, even for vulnerability reports archived by MITRE/NIST, they
usually contain incomplete information about the software's vulnerable versions, making …
usually contain incomplete information about the software's vulnerable versions, making …