A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Devign: Effective vulnerability identification by learning comprehensive program semantics via graph neural networks
Vulnerability identification is crucial to protect the software systems from attacks for cyber
security. It is especially important to localize the vulnerable functions among the source code …
security. It is especially important to localize the vulnerable functions among the source code …
Bgnn4vd: Constructing bidirectional graph neural-network for vulnerability detection
Context: Previous studies have shown that existing deep learning-based approaches can
significantly improve the performance of vulnerability detection. They represent code in …
significantly improve the performance of vulnerability detection. They represent code in …
Vulnerabilities and Security Patches Detection in OSS: A Survey
R Lin, Y Fu, W Yi, J Yang, J Cao, Z Dong, F **e… - ACM Computing …, 2024 - dl.acm.org
Over the past decade, Open Source Software (OSS) has experienced rapid growth and
widespread adoption, attributed to its openness and editability. However, this expansion has …
widespread adoption, attributed to its openness and editability. However, this expansion has …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
αdiff: cross-version binary code similarity detection with dnn
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
A large-scale empirical study of security patches
Given how the" patching treadmill" plays a central role for enabling sites to counter emergent
security concerns, it behooves the security community to understand the patch development …
security concerns, it behooves the security community to understand the patch development …
[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …
vulnerabilities, threatening software security. Unfortunately, with the development and …
Finding a needle in a haystack: Automated mining of silent vulnerability fixes
Following the coordinated vulnerability disclosure model, a vulnerability in open source
software (OSS) is sug-gested to be fixed" silently", without disclosing the fix until the …
software (OSS) is sug-gested to be fixed" silently", without disclosing the fix until the …