A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks

Y Zhou, S Liu, J Siow, X Du… - Advances in neural …, 2019 - proceedings.neurips.cc
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …

Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection

S Cao, X Sun, L Bo, Y Wei, B Li - Information and Software Technology, 2021 - Elsevier
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …

Vulnerabilities and Security Patches Detection in OSS: A Survey

R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F **e… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

αdiff: cross-version binary code similarity detection with dnn

B Liu, W Huo, C Zhang, W Li, F Li, A Piao… - Proceedings of the 33rd …, 2018 - dl.acm.org
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …

A large-scale empirical study of security patches

F Li, V Paxson - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017 - dl.acm.org
Given how the" patching treadmill" plays a central role for enabling sites to counter emergent
security concerns, it behooves the security community to understand the patch development …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

Finding a needle in a haystack: Automated mining of silent vulnerability fixes

J Zhou, M Pacheco, Z Wan, X **a, D Lo… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Following the coordinated vulnerability disclosure model, a vulnerability in open source
software (OSS) is sug-gested to be fixed" silently", without disclosing the fix until the …