A gentle introduction to deep learning for graphs

D Bacciu, F Errica, A Micheli, M Podda - Neural Networks, 2020 - Elsevier
The adaptive processing of graph data is a long-standing research topic that has been lately
consolidated as a theme of major interest in the deep learning community. The snap …

A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

How machine learning is solving the binary function similarity problem

A Marcelli, M Graziano, X Ugarte-Pedrero… - 31st USENIX Security …, 2022 - usenix.org
The ability to accurately compute the similarity between two pieces of binary code plays an
important role in a wide range of different problems. Several research communities such as …

Palmtree: Learning an assembly language model for instruction embedding

X Li, Y Qu, H Yin - Proceedings of the 2021 ACM SIGSAC Conference on …, 2021 - dl.acm.org
Deep learning has demonstrated its strengths in numerous binary analysis tasks, including
function boundary detection, binary code search, function prototype inference, value set …

Order matters: Semantic-aware neural networks for binary code similarity detection

Z Yu, R Cao, Q Tang, S Nie, J Huang… - Proceedings of the AAAI …, 2020 - ojs.aaai.org
Binary code similarity detection, whose goal is to detect similar binary functions without
having access to the source code, is an essential task in computer security. Traditional …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

Jtrans: Jump-aware transformer for binary code similarity detection

H Wang, W Qu, G Katz, W Zhu, Z Gao, H Qiu… - Proceedings of the 31st …, 2022 - dl.acm.org
Binary code similarity detection (BCSD) has important applications in various fields such as
vulnerabilities detection, software component analysis, and reverse engineering. Recent …

Eth2vec: learning contract-wide code representations for vulnerability detection on ethereum smart contracts

N Ashizawa, N Yanai, JP Cruz, S Okamura - Proceedings of the 3rd ACM …, 2021 - dl.acm.org
Ethereum smart contracts are programs that run on the Ethereum blockchain, and many
smart contract vulnerabilities have been discovered in the past decade. Many security …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W **e, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

Trex: Learning execution semantics from micro-traces for binary similarity

K Pei, Z Xuan, J Yang, S Jana, B Ray - arxiv preprint arxiv:2012.08680, 2020 - arxiv.org
Detecting semantically similar functions--a crucial analysis capability with broad real-world
security usages including vulnerability detection, malware lineage, and forensics--requires …