Disassembly is the basis of static analysis of binary code and is used in malicious code detection, vulnerability mining, software optimization, etc. Disassembly of arbitrary suspicious code blocks (e.g., for suspicious traffic packets intercepted by the network) is a difficult task. Traditional disassembly methods require manual specification of the starting address and cannot automate the disassembly of arbitrary code blocks. In this paper, we propose a disassembly method based on code extension selection network by combining traditional linear sweep and recursive traversal methods. First, each byte of a code block is used as the disassembly start address, and all disassembly results (control flow graphs) are combined into a single flow g...
Binary diffing analysis quantitatively measures the differences between two given binaries and produ...
The main objective of this workshop is to bring together researchers in the machine learning and pro...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
Abstract. A probabilistic finite state machine approach to statically disassem-bling x86 machine lan...
Machine code disassembly routines form a fundamental component of software systems that statically a...
The use of natural language processing to analyze binary data is a popular research topic in malware...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
Procedural abstraction (PA) extracts duplicate code seg-ments into a newly created method and hence ...
Procedural abstraction (PA) extracts duplicate code seg-ments into a newly created method and hence ...
2016 4th IEEE International Symposium on Digital Forensics and Security (ISDFS), Arkansas, USA, 25 -...
Dismantling a network by removing the minimum vertices is a challenging problem in complex networks....
Cette thèse porte en premier lieu sur l'analyse et le désassemblage de programmes malveillants utili...
Machine code disassembling is a process of transforming binary machine code into assembly code. The ...
Optimal disassembly sequences can be obtained on the basis of linear and mixed-integer programming m...
Binary diffing analysis quantitatively measures the differences between two given binaries and produ...
The main objective of this workshop is to bring together researchers in the machine learning and pro...
This paper describes methods and procedures used for code analysis and transformation. It contains b...
Abstract. A probabilistic finite state machine approach to statically disassem-bling x86 machine lan...
Machine code disassembly routines form a fundamental component of software systems that statically a...
The use of natural language processing to analyze binary data is a popular research topic in malware...
The problem of correctly recovering assembly instructions from a binary has received much attention ...
. A structuring algorithm for arbitrary control flow graphs is presented. Graphs are structured into...
Procedural abstraction (PA) extracts duplicate code seg-ments into a newly created method and hence ...
Procedural abstraction (PA) extracts duplicate code seg-ments into a newly created method and hence ...
2016 4th IEEE International Symposium on Digital Forensics and Security (ISDFS), Arkansas, USA, 25 -...
Dismantling a network by removing the minimum vertices is a challenging problem in complex networks....
Cette thèse porte en premier lieu sur l'analyse et le désassemblage de programmes malveillants utili...
Machine code disassembling is a process of transforming binary machine code into assembly code. The ...
Optimal disassembly sequences can be obtained on the basis of linear and mixed-integer programming m...
Binary diffing analysis quantitatively measures the differences between two given binaries and produ...
The main objective of this workshop is to bring together researchers in the machine learning and pro...
This paper describes methods and procedures used for code analysis and transformation. It contains b...