The binary similarity problem consists in determining if two functions are similar considering only their compiled form. Advanced techniques for binary similarity recently gained momentum as they can be applied in several fields, such as copyright disputes, malware analysis, vulnerability detection, etc. In this paper we describe SAFE, a novel architecture for function representation based on a self-attentive neural network. SAFE works directly on disassembled binary functions, does not require manual feature extraction, is computationally more efficient than existing solutions, and is more general as it works on stripped binaries and on multiple architectures. Results from our experimental evaluation show how SAFE provides a performance im...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
Given the fact that many software projects are closed-source, analyzing security-related vulnerabili...
The binary similarity problem consists in determining if two functions are similar by only consideri...
Code similarity analysis has become more popular due to its significant applicantions, including vul...
In this work we tackle the problem of binary code similarity by using deep learning applied to binar...
Binary code similarity detection has extensive and important applications in program traceability an...
Binary code similarity detection (BCSD) is widely used in various binary analysis tasks such as vuln...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
In recent years, binary analysis gained traction as a fundamental approach to inspect software and g...
In this paper we consider the binary similarity problem that consists in determining if two binary f...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
Binary code similarity analysis (BCSA) is widely used for diverse security applications, including p...
Open-source libraries are widely used in software development, and the functions from these librarie...
IoT devices are increasingly present, both in the industry and in consumer markets, but their securi...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
Given the fact that many software projects are closed-source, analyzing security-related vulnerabili...
The binary similarity problem consists in determining if two functions are similar by only consideri...
Code similarity analysis has become more popular due to its significant applicantions, including vul...
In this work we tackle the problem of binary code similarity by using deep learning applied to binar...
Binary code similarity detection has extensive and important applications in program traceability an...
Binary code similarity detection (BCSD) is widely used in various binary analysis tasks such as vuln...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
In recent years, binary analysis gained traction as a fundamental approach to inspect software and g...
In this paper we consider the binary similarity problem that consists in determining if two binary f...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
Binary code similarity analysis (BCSA) is widely used for diverse security applications, including p...
Open-source libraries are widely used in software development, and the functions from these librarie...
IoT devices are increasingly present, both in the industry and in consumer markets, but their securi...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
Given the fact that many software projects are closed-source, analyzing security-related vulnerabili...