A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection

S Cao, X Sun, L Bo, Y Wei, B Li - Information and Software Technology, 2021 - Elsevier
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …

Vulnerabilities and Security Patches Detection in OSS: A Survey

R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F **e… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …

Practical binary code similarity detection with bert-based transferable similarity learning

S Ahn, S Ahn, H Koo, Y Paek - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …

ModX: binary level partially imported third-party library detection via program modularization and semantic matching

C Yang, Z Xu, H Chen, Y Liu, X Gong… - Proceedings of the 44th …, 2022 - dl.acm.org
With the rapid growth of software, using third-party libraries (TPLs) has become increasingly
popular. The prosperity of the library usage has provided the software engineers with a …

BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention

Y Wang, P Jia, X Peng, C Huang, J Liu - Computers & Security, 2023 - Elsevier
Static detection of security vulnerabilities in binary programs is an important research field in
software supply chain security. However, existing vulnerability detection methods based on …

Locating the security patches for disclosed oss vulnerabilities with vulnerability-commit correlation ranking

X Tan, Y Zhang, C Mi, J Cao, K Sun, Y Lin… - Proceedings of the 2021 …, 2021 - dl.acm.org
Security patches play an important role in defending against the security threats brought by
the increasing OSS vulnerabilities. However, the collection of security patches still remains a …

[HTML][HTML] A comprehensive review and assessment of cybersecurity vulnerability detection methodologies

K Bennouk, N Ait Aali, Y El Bouzekri El Idrissi… - … of Cybersecurity and …, 2024 - mdpi.com
The number of new vulnerabilities continues to rise significantly each year. Simultaneously,
vulnerability databases have challenges in promptly sharing new security events with …

Precise and efficient patch presence test for android applications against code obfuscation

Z **e, M Wen, H Jia, X Guo, X Huang, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Third-party libraries (TPLs) are widely utilized by Android developers to implement new
apps. Unfortunately, TPLs are often suffering from various vulnerabilities, which could be …

Facilitating vulnerability assessment through poc migration

J Dai, Y Zhang, H Xu, H Lyu, Z Wu, X **ng… - Proceedings of the 2021 …, 2021 - dl.acm.org
Recent research shows that, even for vulnerability reports archived by MITRE/NIST, they
usually contain incomplete information about the software's vulnerable versions, making …