Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …
paramount importance. The embedded systems are very frequently used in both security …
code2vec: Learning distributed representations of code
We present a neural model for representing snippets of code as continuous distributed
vectors (``code embeddings''). The main idea is to represent a code snippet as a single fixed …
vectors (``code embeddings''). The main idea is to represent a code snippet as a single fixed …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
Reverse engineering is a manually intensive but necessary technique for understanding the
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
inner workings of new malware, finding vulnerabilities in existing systems, and detecting …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
Neural machine translation inspired binary code similarity comparison beyond function pairs
Binary code analysis allows analyzing binary code without having access to the
corresponding source code. A binary, after disassembly, is expressed in an assembly …
corresponding source code. A binary, after disassembly, is expressed in an assembly …
[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - hunter-ht.cn
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …
vulnerabilities, threatening software security. Unfortunately, with the development and …
αdiff: cross-version binary code similarity detection with dnn
Binary code similarity detection (BCSD) has many applications, including patch analysis,
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …
plagiarism detection, malware detection, and vulnerability search etc. Existing solutions …