A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions

P Sun, Y Wan, Z Wu, Z Fang, Q Li - Computers & Security, 2025 - Elsevier
With the continuous development of information technology, privacy protection in the Internet
of Things (IoT) has attracted people's attention. This paper summarizes and discusses the …

Of ahead time: Evaluating disassembly of android apps compiled to binary oats through the art

J Bleier, M Lindorfer - Proceedings of the 16th European Workshop on …, 2023 - dl.acm.org
The Android operating system has evolved significantly since its initial release in 2008. Most
importantly, in a continuing effort to increase the run-time performance of mobile …

[HTML][HTML] Identifying runtime libraries in statically linked Linux binaries

J Carrillo-Mondéjar, RJ Rodríguez - Future Generation Computer Systems, 2025 - Elsevier
Vulnerabilities in unpatched applications can originate from third-party dependencies in
statically linked applications, as they must be relinked each time to take advantage of …

Understanding the AI-powered Binary Code Similarity Detection

L Fu, P Liu, W Meng, K Lu, S Zhou, X Zhang… - arxiv preprint arxiv …, 2024 - arxiv.org
AI-powered binary code similarity detection (BinSD), which transforms intricate binary code
comparison to the distance measure of code embedding through neural networks, has been …

Deep learning based binary code analysis

F Artuso - 2025 - iris.uniroma1.it
The exponential growth of software complexity, coupled with the rise of heterogeneous
architectures, further complicates the process of manual binary code analysis. Despite its …

[PDF][PDF] Advances in Cybersecurity Incident Prevention and Analysis

D Uroz - 2024 - webdiis.unizar.es
In today's digital landscape, organizations of all sizes can expect to experience
cybersecurity incidents at some point, making it imperative that they implement robust …

Accurate Disassembly of ARMv8-A: Design and Implementation of a High-Fidelity Disassembler

W Fu, S Chai, L Wang, Z Wu - 2024 International Conference …, 2024 - ieeexplore.ieee.org
ARMv8-A architecture processors are widely used in high-performance computing, servers,
network equipment and scenarios that support large-scale data processing due to their …