ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Vestige: Identifying Binary Code Provenance for Vulnerability Detection
Applied Cryptography and Network Security - Lecture Notes in Computer Science
◽
10.1007/978-3-030-78375-4_12
◽
2021
◽
pp. 287-310
Author(s):
Yuede Ji
◽
Lei Cui
◽
H. Howie Huang
Keyword(s):
Binary Code
◽
Vulnerability Detection
Download Full-text
Related Documents
Cited By
References
Recurrent Neural Network Based Binary Code Vulnerability Detection
Proceedings of the 2019 2nd International Conference on Algorithms, Computing and Artificial Intelligence
◽
10.1145/3377713.3377738
◽
2019
◽
Author(s):
Jianyun Zheng
◽
Jianmin Pang
◽
Xiaochuan Zhang
◽
Xin Zhou
◽
MingLiang Li
◽
...
Keyword(s):
Neural Network
◽
Recurrent Neural Network
◽
Binary Code
◽
Vulnerability Detection
Download Full-text
VYPER: Vulnerability detection in binary code
Security and Privacy
◽
10.1002/spy2.100
◽
2019
◽
Vol 3
(2)
◽
Author(s):
El Habib Boudjema
◽
Sergey Verlan
◽
Lynda Mokdad
◽
Christèle Faure
Keyword(s):
Binary Code
◽
Vulnerability Detection
Download Full-text
ANALYSIS OF SIDE LOBES OF THE AUTOCORRELATION FUNCTION OF BINARY CODE SEQUENCES WTH LIMITED SIGNAL CONVOLUTION
PROCESSING, TRANSMISSION AND PROTECTION OF INFORMATION IN COMPUTER SYSTEMS
◽
10.31799/978-5-8088-1452-3-2020-1-40-42
◽
2020
◽
Author(s):
S. G. Tolmachev
◽
Keyword(s):
Autocorrelation Function
◽
Binary Code
Download Full-text
A program understanding approach for stripped binary code
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.02608
◽
2009
◽
Vol 28
(10)
◽
pp. 2608-2612
Author(s):
Juan-ru LI
◽
Da-wu GU
◽
Hai-ning LU
Keyword(s):
Binary Code
◽
Program Understanding
Download Full-text
The Design and Development of the Vulnerability Detection System of Android Platform
Revista de la Facultad de Ingeniería
◽
10.21311/002.31.7.10
◽
2016
◽
Keyword(s):
Detection System
◽
Vulnerability Detection
◽
Design And Development
◽
Android Platform
Download Full-text
FTCLNet: Convolutional LSTM with Fourier Transform for Vulnerability Detection
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)
◽
10.1109/trustcom50675.2020.00078
◽
2020
◽
Author(s):
Defu Cao
◽
Jing Huang
◽
Xuanyu Zhang
◽
Xianhua Liu
Keyword(s):
Fourier Transform
◽
Vulnerability Detection
◽
Convolutional Lstm
Download Full-text
D2A: A Dataset Built for AI-Based Vulnerability Detection Methods Using Differential Analysis
2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)
◽
10.1109/icse-seip52600.2021.00020
◽
2021
◽
Author(s):
Yunhui Zheng
◽
Saurabh Pujar
◽
Burn Lewis
◽
Luca Buratti
◽
Edward Epstein
◽
...
Keyword(s):
Detection Methods
◽
Differential Analysis
◽
Vulnerability Detection
Download Full-text
Attention-based Machine Learning Model for Smart Contract Vulnerability Detection
Journal of Physics Conference Series
◽
10.1088/1742-6596/1820/1/012004
◽
2021
◽
Vol 1820
(1)
◽
pp. 012004
Author(s):
Yuhang Sun
◽
Lize Gu
Keyword(s):
Machine Learning
◽
Learning Model
◽
Vulnerability Detection
◽
Smart Contract
◽
Machine Learning Model
Download Full-text
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code
Digital Investigation
◽
10.1016/j.diin.2015.01.011
◽
2015
◽
Vol 12
◽
pp. S61-S71
◽
Cited By ~ 30
Author(s):
Saed Alrabaee
◽
Paria Shirani
◽
Lingyu Wang
◽
Mourad Debbabi
Keyword(s):
Binary Code
◽
Graph Matching
Download Full-text
Source code and binary level vulnerability detection and hot patching
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering
◽
10.1145/3324884.3418914
◽
2020
◽
Author(s):
Zhengzi Xu
Keyword(s):
Source Code
◽
Vulnerability Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close