Investigating Graph Embedding Neural Networks with Unsupervised Features Extraction for Binary Analysis
暂无分享,去创建一个
Giuseppe Antonio Di Luna | Fabio Petroni | Leonardo Querzoni | Roberto Baldoni | Luca Massarelli | R. Baldoni | Fabio Petroni | Leonardo Querzoni | Luca Massarelli | F. Petroni
[1] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[2] Jürgen Schmidhuber,et al. Long Short-Term Memory , 1997, Neural Computation.
[3] Yijun Yu,et al. Cross-Language Learning for Program Classification using Bilateral Tree-Based Convolutional Neural Networks , 2017, AAAI Workshops.
[4] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[5] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[6] Eran Yahav,et al. Statistical similarity of binaries , 2016, PLDI.
[7] Aditya K. Ghose,et al. A deep tree-based model for software defect prediction , 2018, ArXiv.
[8] Marc Brockschmidt,et al. Learning to Represent Programs with Graphs , 2017, ICLR.
[9] Barton P. Miller,et al. Extracting compiler provenance from program binaries , 2010, PASTE '10.
[10] Frances E. Allen,et al. Control-flow analysis , 2022 .
[11] Gang Wang,et al. LEMNA: Explaining Deep Learning based Security Applications , 2018, CCS.
[12] Yoshua Bengio,et al. Empirical Evaluation of Gated Recurrent Neural Networks on Sequence Modeling , 2014, ArXiv.
[13] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[14] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[15] David Brumley,et al. BYTEWEIGHT: Learning to Recognize Functions in Binary Code , 2014, USENIX Security Symposium.
[16] Eran Yahav,et al. Similarity of binaries through re-optimization , 2017, PLDI.
[17] Hong Li,et al. HIMALIA: Recovering Compiler Optimization Levels from Binaries by Deep Learning , 2018, IntelliSys.
[18] Pascal Vincent,et al. Representation Learning: A Review and New Perspectives , 2012, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[19] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[20] Yoshua Bengio,et al. Neural Machine Translation by Jointly Learning to Align and Translate , 2014, ICLR.
[21] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[22] Lingyu Wang,et al. BinComp: A stratified approach to compiler provenance Attribution , 2015, Digit. Investig..
[23] Premkumar T. Devanbu,et al. A Survey of Machine Learning for Big Code and Naturalness , 2017, ACM Comput. Surv..
[24] Baishakhi Ray,et al. Tree2Tree Neural Translation Model for Learning Source Code Changes , 2018, ArXiv.
[25] Heng Yin,et al. Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.
[26] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[27] Ross J. Anderson,et al. Rendezvous: A search engine for binary code , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[28] Omer Levy,et al. code2seq: Generating Sequences from Structured Representations of Code , 2018, ICLR.
[29] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[30] Barton P. Miller,et al. Recovering the toolchain provenance of binary code , 2011, ISSTA '11.
[31] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[32] Benjamin C. M. Fung,et al. Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization , 2019, 2019 IEEE Symposium on Security and Privacy (SP).
[33] Dawn Xiaodong Song,et al. Tree-to-tree Neural Networks for Program Translation , 2018, NeurIPS.
[34] Giuseppe Antonio Di Luna,et al. SAFE: Self-Attentive Function Embeddings for Binary Similarity , 2018, DIMVA.
[35] Jonathan L. Herlocker,et al. Evaluating collaborative filtering recommender systems , 2004, TOIS.
[36] Zhenkai Liang,et al. Neural Nets Can Learn Function Type Signatures From Binaries , 2017, USENIX Security Symposium.
[37] Omer Levy,et al. GLUE: A Multi-Task Benchmark and Analysis Platform for Natural Language Understanding , 2018, BlackboxNLP@EMNLP.