Predicting function names in stripped binaries is an extremely useful but challenging task, as it requires summarizing the execution behavior and semantics of the function in human languages. Recently, there has been significant progress in this direction with machine learning. However, existing approaches fail to model the exhaustive function behavior and thus suffer from the poor generalizability to unseen binaries. To advance the state of the art, we present a function Symbol name prediction and binary Language Modeling (SymLM) framework, with a novel neural architecture that learns the comprehensive function semantics by jointly modeling the execution behavior of the calling context and instructions via a novel fusing encoder. We have e...
Neural programming involves training neural networks to learn programs, mathematics, or logic from d...
The use of natural language processing to analyze binary data is a popular research topic in malware...
Function labels enrich constituency parse tree nodes with information about their abstract syntactic...
Debugging symbols in binary executables carry the names of functions and global variables. When pres...
Reverse engineers benefit from the presence of identifiers such as function names in a binary, but u...
By restoring the program into an easier understandable form, deobfuscation is an important technique...
Function identification is a fundamental challenge in reverse engineering and binary program analysi...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Descriptive names are a vital part of readable, and hence maintain-able, code. Recent progress on au...
Modern-day programming can be viewed as a form of communication between the person who is writing c...
Machine-learning models can reach very high performance with supervised training, where they learn f...
Vulnerability prediction, in which static analysis is leveraged to predict the vulnerabilities of bi...
Machine Learning methods, especially Deep Learning, had an enormous breakthrough in Natural Language...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
Neural programming involves training neural networks to learn programs, mathematics, or logic from d...
The use of natural language processing to analyze binary data is a popular research topic in malware...
Function labels enrich constituency parse tree nodes with information about their abstract syntactic...
Debugging symbols in binary executables carry the names of functions and global variables. When pres...
Reverse engineers benefit from the presence of identifiers such as function names in a binary, but u...
By restoring the program into an easier understandable form, deobfuscation is an important technique...
Function identification is a fundamental challenge in reverse engineering and binary program analysi...
Binary-binary function matching problem serves as a plinth in many reverse engineering techniques su...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Descriptive names are a vital part of readable, and hence maintain-able, code. Recent progress on au...
Modern-day programming can be viewed as a form of communication between the person who is writing c...
Machine-learning models can reach very high performance with supervised training, where they learn f...
Vulnerability prediction, in which static analysis is leveraged to predict the vulnerabilities of bi...
Machine Learning methods, especially Deep Learning, had an enormous breakthrough in Natural Language...
Abstract Binary code similarity analysis is widely used in the field of vulnerability search where s...
Neural programming involves training neural networks to learn programs, mathematics, or logic from d...
The use of natural language processing to analyze binary data is a popular research topic in malware...
Function labels enrich constituency parse tree nodes with information about their abstract syntactic...