A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Avclass2: Massive malware tag extraction from av labels

S Sebastián, J Caballero - Proceedings of the 36th Annual Computer …, 2020 - dl.acm.org
Tags can be used by malware repositories and analysis services to enable searches for
samples of interest across different dimensions. Automatically extracting tags from AV labels …

Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing

P Zhang, A Oest, H Cho, Z Sun… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …

Practical binary code similarity detection with bert-based transferable similarity learning

S Ahn, S Ahn, H Koo, Y Paek - … of the 38th Annual Computer Security …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …

Android malware detection method based on bytecode image

Y Ding, X Zhang, J Hu, W Xu - Journal of Ambient Intelligence and …, 2023 - Springer
Traditional machine learning based malware detection methods often use decompiling
techniques or dynamic monitoring techniques to extract the feature representation of …

The tangled genealogy of IoT malware

E Cozzi, PA Vervier, M Dell'Amico, Y Shen… - Proceedings of the 36th …, 2020 - dl.acm.org
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

Challenges and pitfalls in malware research

M Botacin, F Ceschin, R Sun, D Oliveira, A Grégio - Computers & Security, 2021 - Elsevier
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …

Binary code clone detection across architectures and compiling configurations

Y Hu, Y Zhang, J Li, D Gu - 2017 IEEE/ACM 25th International …, 2017 - ieeexplore.ieee.org
Binary code clone (or similarity) detection is a fundamental technique for many important
applications, such as plagiarism detection, malware analysis, software vulnerability …

Towards automatic software lineage inference

J Jang, M Woo, D Brumley - 22nd USENIX Security Symposium …, 2013 - usenix.org
Software lineage refers to the evolutionary relationship among a collection of software. The
goal of software lineage inference is to recover the lineage given a set of program binaries …