This dataset and pre-trained models are released as a companion to our OOPSLA '20 publication: "Neural Reverse Engineering of Stripped Binaries using Augmented Control Flow Graphs": The dataset file (nero_dataset_binaries.tar.gz) is composed from packages of binary executables created by compiling several GNU source-code packages. We used these executables to evaluate our approach as implemented in our prototype "Nero" and compare it to other approaches. All executables contain debug information which serves as the ground truth for the procedure name predictions. The packages are split into three sets: training, validation and test. The executable file name structure is: "-__O__[-]__". For example "gcc-5__Ou__cssc__sccs". The p...
Neural networks have been shown to be vulnerable against fault injection attacks. These attacks chan...
We have, as individuals and as a society, become increasingly more dependant on software, thus, the ...
This archive includes the source code to replicate the study for the paper On-the-Fly Syntax Highlig...
This dataset and pre-trained models are released as a companion to our OOPSLA '20 publication: "Neur...
International audienceWe consider the problem of recovering the compiling chain used to generate a g...
The aim of inverting artificial neural networks (ANNs) is to find input patterns that are strongly c...
The main objective of this workshop is to bring together researchers in the machine learning and pro...
This study examines the possibility of using a neural network based system to translate compiled exe...
Thesis (Ph.D.)--University of Washington, 2020The recent renaissance of deep neural networks has lea...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Motivated by the goal of enabling energy-efficient and/or lower-cost hardware implementations of dee...
Computational neuroscience is an interdisciplinary field that incorporates an analysis of brain func...
Machine learning models have many applications, being used for example in pattern analysis, image cl...
Round trip engineering of software from source code and reverse engineering of software from binary ...
A neural network (NN) was trained on amino and nucleic acid sequences to test the NN’s ability to pr...
Neural networks have been shown to be vulnerable against fault injection attacks. These attacks chan...
We have, as individuals and as a society, become increasingly more dependant on software, thus, the ...
This archive includes the source code to replicate the study for the paper On-the-Fly Syntax Highlig...
This dataset and pre-trained models are released as a companion to our OOPSLA '20 publication: "Neur...
International audienceWe consider the problem of recovering the compiling chain used to generate a g...
The aim of inverting artificial neural networks (ANNs) is to find input patterns that are strongly c...
The main objective of this workshop is to bring together researchers in the machine learning and pro...
This study examines the possibility of using a neural network based system to translate compiled exe...
Thesis (Ph.D.)--University of Washington, 2020The recent renaissance of deep neural networks has lea...
Binary reverse engineering is used to understand and analyse programs for which the source code is u...
Motivated by the goal of enabling energy-efficient and/or lower-cost hardware implementations of dee...
Computational neuroscience is an interdisciplinary field that incorporates an analysis of brain func...
Machine learning models have many applications, being used for example in pattern analysis, image cl...
Round trip engineering of software from source code and reverse engineering of software from binary ...
A neural network (NN) was trained on amino and nucleic acid sequences to test the NN’s ability to pr...
Neural networks have been shown to be vulnerable against fault injection attacks. These attacks chan...
We have, as individuals and as a society, become increasingly more dependant on software, thus, the ...
This archive includes the source code to replicate the study for the paper On-the-Fly Syntax Highlig...