Enhancing DNN-Based Binary Code Function Search With Low-Cost Equivalence Checking
暂无分享,去创建一个
Yuanyuan Yuan | Qiyi Tang | Sen Nie | Shi Wu | Huaijin Wang | Pingchuan Ma | Shuai Wang | Zhibo Liu
[1] M. Ridley. Explainable Artificial Intelligence (XAI) , 2022, Information Technology and Libraries.
[2] Qiyi Tang,et al. Unleashing the Power of Compiler Intermediate Representation to Enhance Neural Program Embeddings , 2022, 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE).
[3] Yan Lin,et al. When Function Signature Recovery Meets Compiler Optimization , 2021, 2021 IEEE Symposium on Security and Privacy (SP).
[4] Xuezixiang Li,et al. PalmTree: Learning an Assembly Language Model for Instruction Embedding , 2021, CCS.
[5] Frank Busse,et al. Running symbolic execution forever , 2020, ISSTA.
[6] Giovanni Vigna,et al. SYMBION: Interleaving Symbolic with Concrete Execution , 2020, 2020 IEEE Conference on Communications and Network Security (CNS).
[7] Junzhou Huang,et al. Order Matters: Semantic-Aware Neural Networks for Binary Code Similarity Detection , 2020, AAAI.
[8] Yang Liu,et al. Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation , 2019, IEEE Transactions on Software Engineering.
[9] Irfan Ul Haq,et al. A Survey of Binary Code Similarity , 2019, ACM Comput. Surv..
[10] Dawu Gu,et al. A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison , 2019, IEEE Transactions on Software Engineering.
[11] Mathias Payer,et al. Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework , 2019 .
[12] Benjamin C. M. Fung,et al. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[13] Lannan Luo,et al. A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis , 2018, Proceedings 2019 Workshop on Binary Analysis Research.
[14] Koushik Sen,et al. Aroma: code recommendation via structural code search , 2018, Proc. ACM Program. Lang..
[15] Chao Zhang,et al. $\alpha$ Diff: Cross-Version Binary Code Similarity Detection with DNN , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[16] Yu Jiang,et al. VulSeeker: A Semantic Learning Based Vulnerability Seeker for Cross-Platform Binary , 2018, 2018 33rd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[17] Jörg Tiedemann,et al. Sentence embeddings in NLI with iterative refinement encoders , 2018, Natural Language Engineering.
[18] Meng Xu,et al. QSYM : A Practical Concolic Execution Engine Tailored for Hybrid Fuzzing , 2018, USENIX Security Symposium.
[19] Xiaopeng Li,et al. Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs , 2018, NDSS.
[20] Omer Levy,et al. code2seq: Generating Sequences from Structured Representations of Code , 2018, ICLR.
[21] In-So Kweon,et al. CBAM: Convolutional Block Attention Module , 2018, ECCV.
[22] Torsten Hoefler,et al. Neural Code Comprehension: A Learnable Representation of Code Semantics , 2018, NeurIPS.
[23] Omer Levy,et al. code2vec: learning distributed representations of code , 2018, Proc. ACM Program. Lang..
[24] Dinghao Wu,et al. In-memory fuzzing for binary code similarity analysis , 2017, 2017 32nd IEEE/ACM International Conference on Automated Software Engineering (ASE).
[25] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[26] Eran Yahav,et al. Similarity of binaries through re-optimization , 2017, PLDI.
[27] Samuel S. Schoenholz,et al. Neural Message Passing for Quantum Chemistry , 2017, ICML.
[28] Yang Liu,et al. BinGo: cross-architecture cross-OS binary search , 2016, SIGSOFT FSE.
[29] Roberto Baldoni,et al. A Survey of Symbolic Execution Techniques , 2016, ACM Comput. Surv..
[30] Eran Yahav,et al. Statistical similarity of binaries , 2016, PLDI.
[31] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[32] Juanru Li,et al. Cross-Architecture Binary Semantics Understanding via Similar Code Comparison , 2016, 2016 IEEE 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER).
[33] Richard S. Zemel,et al. Gated Graph Sequence Neural Networks , 2015, ICLR.
[34] Sencun Zhu,et al. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection , 2015, IEEE Transactions on Software Engineering.
[35] Dawson R. Engler,et al. Under-Constrained Symbolic Execution: Correctness Checking for Real Code , 2015, USENIX Annual Technical Conference.
[36] Dinghao Wu,et al. Reassembleable Disassembling , 2015, USENIX Security Symposium.
[37] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[38] Christian Rossow,et al. Cross-architecture bug search in binary executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[39] Pascal Junod,et al. Obfuscator-LLVM -- Software Protection for the Masses , 2015, 2015 IEEE/ACM 1st International Workshop on Software Protection.
[40] Sencun Zhu,et al. Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection , 2014, SIGSOFT FSE.
[41] David Brumley,et al. Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components , 2014, USENIX Security Symposium.
[42] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[43] Yaniv David,et al. Tracelet-based code search in executables , 2014, PLDI.
[44] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[45] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[46] Omer Levy,et al. word2vec Explained: deriving Mikolov et al.'s negative-sampling word-embedding method , 2014, ArXiv.
[47] David Brumley,et al. Towards Automatic Software Lineage Inference , 2013, USENIX Security Symposium.
[48] Priya Narasimhan,et al. Binary Function Clustering Using Semantic Hashes , 2012, 2012 11th International Conference on Machine Learning and Applications.
[49] Fangfang Zhang,et al. A first step towards algorithm plagiarism detection , 2012, ISSTA 2012.
[50] Yang Xiang,et al. Software Similarity and Classification , 2012, SpringerBriefs in Computer Science.
[51] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[52] Sencun Zhu,et al. Value-based program characterization and its application to software plagiarism detection , 2011, 2011 33rd International Conference on Software Engineering (ICSE).
[53] Sencun Zhu,et al. Detecting Software Theft via System Call Based Birthmarks , 2009, 2009 Annual Computer Security Applications Conference.
[54] Kang G. Shin,et al. Large-scale malware indexing using function-call graphs , 2009, CCS.
[55] Daniel J. Quinlan,et al. Detecting code clones in binary executables , 2009, ISSTA.
[56] Zhendong Su,et al. Automatic mining of functionally equivalent code fragments via random testing , 2009, ISSTA.
[57] Dawson R. Engler,et al. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs , 2008, OSDI.
[58] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[59] David Brumley,et al. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[60] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[61] David Schuler,et al. A dynamic birthmark for java , 2007, ASE.
[62] Christian S. Collberg,et al. Detecting Software Theft via Whole Program Path Birthmarks , 2004, ISC.
[63] Halvar Flake,et al. Structural Comparison of Executable Objects , 2004, DIMVA.
[64] C. A. R. Hoare,et al. How Did Software Get So Reliable Without Proof? , 1996, FME.
[65] P. S. Gilmour,et al. Defensive programming , 1989 .
[66] Anas N. Al-Rabadi,et al. A comparison of modified reconstructability analysis and Ashenhurst‐Curtis decomposition of Boolean functions , 2004 .
[67] Gang Li,et al. Similarity of Binaries Across Optimization Levels and Obfuscation , 2020, ESORICS.
[68] Ming-Wei Chang,et al. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding , 2019, NAACL.
[69] Xuezixiang Li,et al. Learning Program-Wide Code Representations for Binary Diffing , 2019, NDSS.
[70] Kevin W. Hamlen,et al. Superset Disassembly: Statically Rewriting x86 Binaries Without Heuristics , 2018, NDSS.
[71] Hang Zhang,et al. Precise and Accurate Patch Presence Test for Binaries , 2018, USENIX Security Symposium.
[72] Christopher Krügel,et al. Ramblr: Making Reassembly Great Again , 2017, NDSS.
[73] Jiang Ming,et al. BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking , 2017, USENIX Security Symposium.
[74] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[75] T. Dullien,et al. Graph-based comparison of Executable Objects ( English Version ) , 2005 .