The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Palmtree: Learning an assembly language model for instruction embedding

X Li, Y Qu, H Yin - Proceedings of the 2021 ACM SIGSAC conference on …, 2021 - dl.acm.org
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including
function boundary detection, binary code search, function prototype inference, value set …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X **, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - hunter-ht.cn
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

{VulChecker}: Graph-based vulnerability localization in source code

Y Mirsky, G Macon, M Brown, C Yagemann… - 32nd USENIX Security …, 2023 - usenix.org
In software development, it is critical to detect vulnerabilities in a project as early as possible.
Although, deep learning has shown promise in this task, current state-of-the-art methods …

Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts

N Ashizawa, N Yanai, JP Cruz, S Okamura - Proceedings of the 3rd ACM …, 2021 - dl.acm.org
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many
smart contract vulnerabilities have been discovered in the past decade. Many security …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arxiv preprint arxiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …