Unleashing the power of compiler intermediate representation to enhance neural program embeddings

Z Li, P Ma, H Wang, S Wang, Q Tang, S Nie… - Proceedings of the 44th …, 2022 - dl.acm.org
Neural program embeddings have demonstrated considerable promise in a range of
program analysis tasks, including clone identification, program repair, code completion, and …

Binaug: Enhancing binary similarity analysis with low-cost input repairing

WK Wong, H Wang, Z Li, S Wang - Proceedings of the 46th IEEE/ACM …, 2024 - dl.acm.org
Binary code similarity analysis (BCSA) is a fundamental building block for various software
security, reverse engineering, and re-engineering applications. Existing research has …

Khaos: The impact of inter-procedural code obfuscation on binary diffing techniques

P Zhang, C Wu, M Peng, K Zeng, D Yu, Y Lai… - Proceedings of the 21st …, 2023 - dl.acm.org
Software obfuscation techniques can prevent binary diffing techniques from locating
vulnerable code by obfuscating the third-party code, to achieve the purpose of protecting …

[HTML][HTML] BINCODEX: A comprehensive and multi-level dataset for evaluating binary code similarity detection techniques

P Zhang, C Wu, Z Wang - BenchCouncil Transactions on Benchmarks …, 2024 - Elsevier
The binary code similarity detection (BCSD) technique can quantitatively measure the
differences between two given binaries and give matching results at predefined granularity …

Automated program improvement with reinforcement learning and graph neural networks

N Sukur, N Milošević, D Pracner, Z Budimac - Soft Computing, 2024 - Springer
Automated software transformations and the process of automated program repair and
improvement are an important aspect of modern software engineering practices. In this …

An exploratory study on domain knowledge infusion in deep learning for automated threat defense

S Khanzadeh, ECP Neto, S Iqbal, M Alalfi… - International Journal of …, 2025 - Springer
The wide adoption of interconnected services leads to the creation of supportive solutions
and business opportunities. Conversely, this new paradigm is targeted by malicious …

An Adversarial Attack on ML-Based IoT Malware Detection Using Binary Diversification Techniques

MB Mwangi, SM Cheng - IEEE Access, 2024 - ieeexplore.ieee.org
The integration of machine learning (ML) has revolutionized malware detection, enabling
accurate identification of subtle distinctions between malware and benignware. As the threat …

Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements

H Wang, Z Liu, Y Dai, S Wang, Q Tang, S Nie… - arxiv preprint arxiv …, 2024 - arxiv.org
Software composition analysis (SCA) denotes the process of identifying open-source
software components in an input software application. SCA has been extensively developed …

Flexible software protection

J Van den Broeck, B Coppens, B De Sutter - Computers & Security, 2022 - Elsevier
To counter software reverse engineering or tampering, software obfuscation tools can be
used. However, such tools to a large degree hard-code how the obfuscations are deployed …

[PDF][PDF] Mitigating data plane device compromise in programmable networks

C Black - 2023 - pure.qub.ac.uk
Society's reliance on computer networks has grown rapidly in recent decades, with the
number of interconnected devices projected to hit 29.3 billion in 2023 [3]. This explosion in …