A systematic literature review on the applications of recurrent neural networks in code clone research

FH Quradaa, S Shahzad, RS Almoqbily - Plos one, 2024 - journals.plos.org
Code clones, referring to code fragments that are either similar or identical and are copied
and pasted within software systems, have negative effects on both software quality and …

HGE-BVHD: Heterogeneous graph embedding scheme of complex structure functions for binary vulnerability homology discrimination

J **ng, S Luo, L Pan, J Hao, Y Guan, Z Wu - Expert Systems with …, 2024 - Elsevier
Homologous vulnerability detection is an important aspect of computer security. It has
several key problems, including discriminating structurally complex functions, supporting …

Convolutional neural network-based terahertz spectral classification of liquid contraband for security inspection

C Wang, F Shi, M Zhao, J Ao, C Jia… - IEEE Sensors …, 2021 - ieeexplore.ieee.org
Terahertz (THz) spectroscopy is now achieving increasing attention in security inspection
owning to its non-destructiveness and deep penetrability of most packaging materials, such …

Multi-modal Learning for WebAssembly Reverse Engineering

H Huang, J Zhao - Proceedings of the 33rd ACM SIGSOFT International …, 2024 - dl.acm.org
The increasing adoption of WebAssembly (Wasm) for performance-critical and security-
sensitive tasks drives the demand for WebAssembly program comprehension and reverse …

[HTML][HTML] IntelliSwAS: Optimizing deep neural network architectures using a particle swarm-based approach

SC Nistor, G Czibula - Expert Systems with Applications, 2022 - Elsevier
Deep learning is in a continuous evolution and many domains benefit from this substantial
progress in the development of intelligent solutions. While this progress has been swift …

A deep learning‐based approach for software vulnerability detection using code metrics

F Subhan, X Wu, L Bo, X Sun, M Rahman - IET Software, 2022 - Wiley Online Library
Vulnerabilities can have devastating effects on information security, affecting the economy,
social stability, and national security. The idea of automatic vulnerability detection has …

EMBERSim: a large-scale databank for boosting similarity search in malware analysis

DG Corlatescu, A Dinu, MP Gaman… - Advances in Neural …, 2024 - proceedings.neurips.cc
In recent years there has been a shift from heuristics based malware detection towards
machine learning, which proves to be more robust in the current heavily adversarial threat …

ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains

H Jang, N Murodova, H Koo - IEEE Access, 2024 - ieeexplore.ieee.org
Identifying compiler toolchain provenance serves as a basis for both benign and malicious
binary analyses. A wealth of prior studies mostly focuses on the inference of a popular …

Codeformer: A gnn-nested transformer model for binary code similarity detection

G Liu, X Zhou, J Pang, F Yue, W Liu, J Wang - Electronics, 2023 - mdpi.com
Binary code similarity detection is used to calculate the code similarity of a pair of binary
functions or files, through a certain calculation method and judgment method. It is a …

Automated WebAssembly Function Purpose Identification With Semantics-Aware Analysis

A Romano, W Wang - Proceedings of the ACM Web Conference 2023, 2023 - dl.acm.org
WebAssembly is a recent web standard built for better performance in web applications. The
standard defines a binary code format to use as a compilation target for a variety of …