A gentle introduction to deep learning for graphs
The adaptive processing of graph data is a long-standing research topic that has been lately
consolidated as a theme of major interest in the deep learning community. The snap …
consolidated as a theme of major interest in the deep learning community. The snap …
A survey of binary code similarity
IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …
similarities and differences. The ability to compare binary code enables many real-world …
How machine learning is solving the binary function similarity problem
A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …
important role in a wide range of different problems. Several research communities such as …
Palmtree: Learning an assembly language model for instruction embedding
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including
function boundary detection, binary code search, function prototype inference, value set …
function boundary detection, binary code search, function prototype inference, value set …
Order matters: Semantic-aware neural networks for binary code similarity detection
Binary code similarity detection, whose goal is to detect similar binary functions without
having access to the source code, is an essential task in computer security. Traditional …
having access to the source code, is an essential task in computer security. Traditional …
Deepbindiff: Learning program-wide code representations for binary diffing
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …
and produces fine-grained basic block matching. It has been widely used to enable different …
Jtrans: Jump-aware transformer for binary code similarity detection
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
vulnerabilities detection, software component analysis, and reverse engineering. Recent …
Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts
N Ashizawa, N Yanai, JP Cruz, S Okamura - Proceedings of the 3rd ACM …, 2021 - dl.acm.org
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many
smart contract vulnerabilities have been discovered in the past decade. Many security …
smart contract vulnerabilities have been discovered in the past decade. Many security …
[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.
Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …
vulnerabilities, threatening software security. Unfortunately, with the development and …
Trex: Learning execution semantics from micro-traces for binary similarity
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …
security usages including vulnerability detection, malware lineage, and forensics--requires …