Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
暂无分享,去创建一个
Le Song | Heng Yin | Dawn Xiaodong Song | Chang Liu | Qian Feng | Xiaojun Xu | D. Song | Le Song | Xiaojun Xu | Chang Liu | Heng Yin | Qian Feng | Xiaojun Xu
[1] Yann LeCun,et al. Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..
[2] Geoffrey E. Hinton,et al. Deep Learning , 2015, Nature.
[3] Aurélien Francillon,et al. A Large-Scale Analysis of the Security of Embedded Firmwares , 2014, USENIX Security Symposium.
[4] Jure Leskovec,et al. node2vec: Scalable Feature Learning for Networks , 2016, KDD.
[5] Salvatore J. Stolfo,et al. When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.
[6] Khaled Yakdan,et al. discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code , 2016, NDSS.
[7] Christopher Krügel,et al. Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware , 2015, NDSS.
[8] T. Dullien,et al. Graph-based comparison of Executable Objects ( English Version ) , 2005 .
[9] Laurens van der Maaten,et al. Accelerating t-SNE using tree-based algorithms , 2014, J. Mach. Learn. Res..
[10] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[11] Jason Weston,et al. Mismatch String Kernels for SVM Protein Classification , 2002, NIPS.
[12] Andrew Walenstein,et al. Malware phylogeny generation using permutations of code , 2005, Journal in Computer Virology.
[13] Christian Rossow,et al. Leveraging semantic signatures for bug search in binary programs , 2014, ACSAC.
[14] Mikhail Belkin,et al. Laplacian Eigenmaps and Spectral Techniques for Embedding and Clustering , 2001, NIPS.
[15] Debin Gao,et al. iBinHunt: Binary Hunting with Inter-procedural Control Flow , 2012, ICISC.
[16] David Brumley,et al. Automatic exploit generation , 2014, CACM.
[17] David Brumley,et al. Program-Adaptive Mutational Fuzzing , 2015, 2015 IEEE Symposium on Security and Privacy.
[18] S T Roweis,et al. Nonlinear dimensionality reduction by locally linear embedding. , 2000, Science.
[19] Alexander J. Smola,et al. Learning with kernels , 1998 .
[20] Kaspar Riesen,et al. Approximate graph edit distance computation by means of bipartite graph matching , 2009, Image Vis. Comput..
[21] Steven Skiena,et al. DeepWalk: online learning of social representations , 2014, KDD.
[22] S. V. N. Vishwanathan,et al. Graph kernels , 2007 .
[23] Le Song,et al. Discriminative Embeddings of Latent Variable Models for Structured Data , 2016, ICML.
[24] David Brumley,et al. Towards Automated Dynamic Analysis for Linux-based Embedded Firmware , 2016, NDSS.
[25] Bernhard Schölkopf,et al. Kernel Methods in Computational Biology , 2005 .
[26] Heng Yin,et al. Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.
[27] Christian Rossow,et al. Cross-Architecture Bug Search in Binary Executables , 2015, 2015 IEEE Symposium on Security and Privacy.
[28] David Brumley,et al. Optimizing Seed Selection for Fuzzing , 2014, USENIX Security Symposium.
[29] Kurt Mehlhorn,et al. Weisfeiler-Lehman Graph Kernels , 2011, J. Mach. Learn. Res..
[30] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[31] Jimmy Ba,et al. Adam: A Method for Stochastic Optimization , 2014, ICLR.
[32] Yaniv David,et al. Tracelet-based code search in executables , 2014, PLDI.
[33] Peng Wang,et al. Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale , 2015, USENIX Security Symposium.
[34] Dawn Xiaodong Song,et al. Recognizing Functions in Binaries with Neural Networks , 2015, USENIX Security Symposium.
[35] Tony Jebara,et al. Probability Product Kernels , 2004, J. Mach. Learn. Res..
[36] David Haussler,et al. Using the Fisher Kernel Method to Detect Remote Protein Homologies , 1999, ISMB.
[37] Ah Chung Tsoi,et al. The Graph Neural Network Model , 2009, IEEE Transactions on Neural Networks.
[38] Jan Ramon,et al. Expressivity versus efficiency of graph kernels , 2003 .
[39] Andy King,et al. BinSlayer: accurate comparison of binary executables , 2013, PPREW '13.
[40] Ruslan Salakhutdinov,et al. Revisiting Semi-Supervised Learning with Graph Embeddings , 2016, ICML.
[41] Kurt Mehlhorn,et al. Efficient graphlet kernels for large graph comparison , 2009, AISTATS.
[42] Ross J. Anderson,et al. Rendezvous: A search engine for binary code , 2013, 2013 10th Working Conference on Mining Software Repositories (MSR).
[43] Mingzhe Wang,et al. LINE: Large-scale Information Network Embedding , 2015, WWW.
[44] Linton C. Freeman,et al. Carnegie Mellon: Journal of Social Structure: Visualizing Social Networks Visualizing Social Networks , 2022 .
[45] Debin Gao,et al. BinHunt: Automatically Finding Semantic Differences in Binary Programs , 2008, ICICS.
[46] Palash Goyal,et al. Graph Embedding Techniques, Applications, and Performance: A Survey , 2017, Knowl. Based Syst..