Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain
Abstract
References
Index Terms
- Binary Representation Embedding and Deep Learning For Binary Code Similarity Detection in Software Security Domain
Recommendations
New extremal binary self-dual codes of length 64 from $$R_3$$R3-lifts of the extended binary Hamming code
In this paper, we use the graded ring construction to lift the extended binary Hamming code of length 8 to $$R_k$$ R k . Using this method we construct self-dual codes over $$R_3$$ R 3 of length 8 whose Gray images are self-dual binary codes of length 64. In this way, we ...
Code automorphisms and permutation decoding of certain Reed-Solomon binary images
We consider primitive Reed-Solomon (RS) codes over the field F2m of length n = 2m - 1. Building on Lacan et al.'s results for the case of binary extension fields, we show that the binary images of certain two-parity symbol RS [n, n - 2,3] code, have a ...
SimCGE: Simple Contrastive Learning of Graph Embeddings for Cross-Version Binary Code Similarity Detection
Information and Communications SecurityAbstractBinary code similarity detection (BCSD) has many applications in computer security, whose task is to detect the similarity of two binary functions without having access to the source code. Recently deep learning methods have shown better ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 99Total Downloads
- Downloads (Last 12 months)76
- Downloads (Last 6 weeks)8
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign inFull Access
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderHTML Format
View this article in HTML Format.
HTML Format