Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Avclass2: Massive malware tag extraction from av labels
Tags can be used by malware repositories and analysis services to enable searches for
samples of interest across different dimensions. Automatically extracting tags from AV labels …
samples of interest across different dimensions. Automatically extracting tags from AV labels …
Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing
Phishing is a critical threat to Internet users. Although an extensive ecosystem serves to
protect users, phishing websites are growing in sophistication, and they can slip past the …
protect users, phishing websites are growing in sophistication, and they can slip past the …
Practical binary code similarity detection with bert-based transferable similarity learning
Binary code similarity detection (BCSD) serves as a basis for a wide spectrum of
applications, including software plagiarism, malware classification, and known vulnerability …
applications, including software plagiarism, malware classification, and known vulnerability …
Android malware detection method based on bytecode image
Y Ding, X Zhang, J Hu, W Xu - Journal of Ambient Intelligence and …, 2023 - Springer
Traditional machine learning based malware detection methods often use decompiling
techniques or dynamic monitoring techniques to extract the feature representation of …
techniques or dynamic monitoring techniques to extract the feature representation of …
The tangled genealogy of IoT malware
The recent emergence of consumer off-the-shelf embedded (IoT) devices and the rise of
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …
large-scale IoT botnets has dramatically increased the volume and sophistication of Linux …
{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …
patch analysis, have been widely employed in various software security analysis tasks, such …
Challenges and pitfalls in malware research
As the malware research field became more established over the last two decades, new
research questions arose, such as how to make malware research reproducible, how to …
research questions arose, such as how to make malware research reproducible, how to …
Binary code clone detection across architectures and compiling configurations
Binary code clone (or similarity) detection is a fundamental technique for many important
applications, such as plagiarism detection, malware analysis, software vulnerability …
applications, such as plagiarism detection, malware analysis, software vulnerability …
Towards automatic software lineage inference
Software lineage refers to the evolutionary relationship among a collection of software. The
goal of software lineage inference is to recover the lineage given a set of program binaries …
goal of software lineage inference is to recover the lineage given a set of program binaries …