Open-source libraries are widely used in software development, and the functions from these libraries may contain security vulnerabilities that can provide gateways for attackers. This paper provides a function similarity technique to identify vulnerable functions in compiled programs and proposes a new technique called Cross-Compiler Bipartite Vulnerability Search (CCBVS). CCBVS uses a novel training process, and bipartite matching to filter SVM model false positives to improve the quality of similar function identification. This research uses debug symbols in programs compiled from open-source software products to generate the ground truth. This automatic extraction of ground truth allows experimentation with a wide range of programs. The...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
One of the most important challenges in the field of a software code audit is the presence of vulner...
In the current software development market, many software is being developed using a copy-paste mech...
Open-source libraries are widely used in software development, and the functions from these librarie...
Open-source libraries are widely used in software development, and the functions from these librarie...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
The identification of similar functions in malware assists analysis by supporting the exclusion of f...
Code cloning and copy-pasting code fragments is common practice in software engineering. If security...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
Code similarity analysis has become more popular due to its significant applicantions, including vul...
IoT devices are increasingly present, both in the industry and in consumer markets, but their securi...
The binary similarity problem consists in determining if two functions are similar considering only ...
Binary code similarity detection (BCSD) is widely used in various binary analysis tasks such as vuln...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
One of the most important challenges in the field of a software code audit is the presence of vulner...
In the current software development market, many software is being developed using a copy-paste mech...
Open-source libraries are widely used in software development, and the functions from these librarie...
Open-source libraries are widely used in software development, and the functions from these librarie...
Finding changed and similar functions between a pair of binaries is an important problem in malware ...
The identification of similar functions in malware assists analysis by supporting the exclusion of f...
Code cloning and copy-pasting code fragments is common practice in software engineering. If security...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
The proliferation of IoT-devices is turning different kinds of embedded systems into another relevan...
Code similarity analysis has become more popular due to its significant applicantions, including vul...
IoT devices are increasingly present, both in the industry and in consumer markets, but their securi...
The binary similarity problem consists in determining if two functions are similar considering only ...
Binary code similarity detection (BCSD) is widely used in various binary analysis tasks such as vuln...
Malware, a category of software including viruses, worms, and other malicious programs, is developed...
One of the most important challenges in the field of a software code audit is the presence of vulner...
In the current software development market, many software is being developed using a copy-paste mech...