Proceedings 2021 Workshop on Binary Analysis Research

2021 ◽  
Keyword(s):  
Author(s):  
Minkyu Jung ◽  
Soomin Kim ◽  
HyungSeok Han ◽  
Jaeseung Choi ◽  
Sang Kil Cha
Keyword(s):  

Author(s):  
Robert S. Chang

This chapter offers an analytic model for understanding conflict and coalition on the terrain of race by discussing racialization and racial stratification. In this analytic model of first-, second-, and third-order racial analyses, the first-order binary model restates the duality of the primary racial opposition in U.S. history—black and white—and recognizes that many analyses of racial and ethnic conflict follow this basic majority–minority binary opposition. Meanwhile, second-order binary analysis stays within a group-to-group binary framework, but looks at the relationship between minority A and minority B. The chapter then shows how an understanding of racialization and racial stratification lends itself to third-order multigroup analysis. It concludes by discussing the limits of building coalitions in a purely oppositional mode, and explores the need for building common cause that extends beyond opposition to white capitalist patriarchy.


Author(s):  
Dean Pucsek ◽  
Jennifer Baldwin ◽  
Laura MacLeod ◽  
Celina Berg ◽  
Yvonne Coady ◽  
...  
Keyword(s):  

2019 ◽  
Vol 9 (19) ◽  
pp. 4086 ◽  
Author(s):  
Yongjun Lee ◽  
Hyun Kwon ◽  
Sang-Hoon Choi ◽  
Seung-Ho Lim ◽  
Sung Hoon Baek ◽  
...  

Potential software weakness, which can lead to exploitable security vulnerabilities, continues to pose a risk to computer systems. According to Common Vulnerability and Exposures, 14,714 vulnerabilities were reported in 2017, more than twice the number reported in 2016. Automated vulnerability detection was recommended to efficiently detect vulnerabilities. Among detection techniques, static binary analysis detects software weakness based on existing patterns. In addition, it is based on existing patterns or rules, making it difficult to add and patch new rules whenever an unknown vulnerability is encountered. To overcome this limitation, we propose a new method—Instruction2vec—an improved static binary analysis technique using machine. Our framework consists of two steps: (1) it models assembly code efficiently using Instruction2vec, based on Word2vec; and (2) it learns the features of software weakness code using the feature extraction of Text-CNN without creating patterns or rules and detects new software weakness. We compared the preprocessing performance of three frameworks—Instruction2vec, Word2vec, and Binary2img—to assess the efficiency of Instruction2vec. We used the Juliet Test Suite, particularly the part related to Common Weakness Enumeration(CWE)-121, for training and Securely Taking On New Executable Software of Uncertain Provenance (STONESOUP) for testing. Experimental results show that the proposed scheme can detect software vulnerabilities with an accuracy of 91% of the assembly code.


Author(s):  
Jayakrishna Menon ◽  
Christophe Hauser ◽  
Yan Shoshitaishvili ◽  
Stephen Schwab

Sign in / Sign up

Export Citation Format

Share Document