Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
How machine learning is solving the binary function similarity problem
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Palmtree: Learning an assembly language model for instruction embedding
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including
function boundary detection, binary code search, function prototype inference, value set …
function boundary detection, binary code search, function prototype inference, value set …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …
it requires summarizing the execution behavior and semantics of the function in human …
[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - hunter-ht.cn
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …
vulnerabilities, threatening software security. Unfortunately, with the development and …
{VulChecker}: Graph-based vulnerability localization in source code
In software development, it is critical to detect vulnerabilities in a project as early as possible.
Although, deep learning has shown promise in this task, current state-of-the-art methods …
Although, deep learning has shown promise in this task, current state-of-the-art methods …
Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts
N Ashizawa, N Yanai, JP Cruz, S Okamura - Proceedings of the 3rd ACM …, 2021 - dl.acm.org
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many
smart contract vulnerabilities have been discovered in the past decade. Many security …
smart contract vulnerabilities have been discovered in the past decade. Many security …
Trex: Learning execution semantics from micro-traces for binary similarity
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …
security usages including vulnerability detection, malware lineage, and forensics--requires …