This thesis explores how architecture and endianness of executable code can be identified using binary file contents, as falsely identifying the architecture caused about 10% of failures of firmware analysis in a recent study by Costin et al. (2014) . A literature review was performed to identify the current state-of-the-art methods and how they could be improved in terms of algorithms, performance, data sets, and support tools. The thorough review identified methods presented by Clemens (2015) and De Nicolao et al. (2018) as the state-of-the-art and found that they had good results. However, these methods were found lacking essential tools to acquire or build the data sets as well as requiring more comprehensive comparison of classifier pe...
Modern society depends on critical infrastructure (CI) managed by Programmable Logic Controllers (PL...
We describe the use of machine learning and data mining to detect and classify malicious executables...
Comparison of functions is required in various domains of software engineering. In most domains, ...
This thesis explores how architecture and endianness of executable code can be identified using bina...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
Classification Computer architecture Malware analysis Object code a b s t r a c t Recent research ha...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
A mapping between a system's implementation and its software architecture is mandatory in many archi...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
The explosive growth of software systems with both size and complexity results in the recognised nee...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Modern society depends on critical infrastructure (CI) managed by Programmable Logic Controllers (PL...
We describe the use of machine learning and data mining to detect and classify malicious executables...
Comparison of functions is required in various domains of software engineering. In most domains, ...
This thesis explores how architecture and endianness of executable code can be identified using bina...
Static and dynamic binary analysis techniques are actively used to reverse engineer software's behav...
Classification Computer architecture Malware analysis Object code a b s t r a c t Recent research ha...
AbstractRecent research has repeatedly shown that machine learning techniques can be applied to eith...
A mapping between a system's implementation and its software architecture is mandatory in many archi...
The research project, Feature Extraction and, Analysis of Binaries for Classification, provides an i...
The explosive growth of software systems with both size and complexity results in the recognised nee...
Binary analysis allows researchers to examine how programs are constructed and how they will impact ...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
Static binary analysis is being used extensively for detecting security flaws in binary programs. Mu...
Modern society depends on critical infrastructure (CI) managed by Programmable Logic Controllers (PL...
We describe the use of machine learning and data mining to detect and classify malicious executables...
Comparison of functions is required in various domains of software engineering. In most domains, ...