A survey of binary code similarity
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …
paramount importance. The embedded systems are very frequently used in both security …
code2vec: Learning distributed representations of code
We present a neural model for representing snippets of code as continuous distributed
vectors (``code embeddings''). The main idea is to represent a code snippet as a single fixed …
vectors (``code embeddings''). The main idea is to represent a code snippet as a single fixed …
How machine learning is solving the binary function similarity problem
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
Neural machine translation inspired binary code similarity comparison beyond function pairs
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …
corresponding source code. A binary, after disassembly, is expressed in an assembly …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
αdiff: cross-version binary code similarity detection with dnn
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
Machine learning in compiler optimization
In the last decade, machine-learning-based compilation has moved from an obscure
research niche to a mainstream activity. In this paper, we describe the relationship between …
research niche to a mainstream activity. In this paper, we describe the relationship between …