1
Probabilistic Naming of Functions in Stripped Binaries
2
XDA: Accurate, Robust Disassembly with Transfer Learning
3
CodeBERT: A Pre-Trained Model for Programming and Natural Languages
4
A Simple Framework for Contrastive Learning of Visual Representations
5
Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
6
PyTorch: An Imperative Style, High-Performance Deep Learning Library
7
Reducing Transformer Depth on Demand with Structured Dropout
8
Do NLP Models Know Numbers? Probing Numeracy in Embeddings
9
SpanBERT: Improving Pre-training by Representing and Predicting Spans
10
Learning Execution through Neural Code Fusion
11
Software Ethology: An Accurate and Resilient Semantic Binary Analysis Framework
12
Software Ethology: An Accurate, Resilient, and Cross-Architecture Binary Analysis Framework
13
Towards Neural Decompilation
14
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization
15
fairseq: A Fast, Extensible Toolkit for Sequence Modeling
16
A Theoretical Analysis of Contrastive Unsupervised Representation Learning
17
Cross-lingual Language Model Pretraining
18
SAFE: Self-Attentive Function Embeddings for Binary Similarity
19
VulSeeker-pro: enhanced semantic learning based binary vulnerability seeker with emulation
20
Debin: Predicting Debug Information in Stripped Binaries
21
Compilation Error Repair: For the Student Programs, From the Student Programs
22
code2vec: learning distributed representations of code
23
Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis
24
Learning Memory Access Patterns
25
Using recurrent neural networks for decompilation
26
Learning to Represent Programs with Graphs
27
A Survey of Machine Learning for Big Code and Naturalness
28
Semantics-Aware Machine Learning for Function Recognition in Binary Code
29
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
30
Automatic Grading and Feedback using Program Repair for Introductory Programming Courses
31
Similarity of binaries through re-optimization
32
Attention is All you Need
33
Accurate, Large Minibatch SGD: Training ImageNet in 1 Hour
34
Binary Code Clone Detection across Architectures and Compiling Configurations
35
Compiler-Agnostic Function Detection in Binaries
36
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection
37
rev.ng: a unified binary analysis framework to recover CFGs and function boundaries
38
BinGo: cross-architecture cross-OS binary search
39
Scalable Graph-based Bug Search for Firmware Images
40
Gaussian Error Linear Units (GELUs)
41
SQuAD: 100,000+ Questions for Machine Comprehension of Text
42
Statistical similarity of binaries
43
SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis
44
Deep Residual Learning for Image Recognition
45
Recognizing Functions in Binaries with Neural Networks
46
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers
47
Cross-architecture bug search in binary executables
48
Leveraging semantic signatures for bug search in binary programs
49
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection
50
Mining of Massive Datasets
51
Similarity-based matching meets Malware Diversity
52
Blanket Execution: Dynamic Similarity Testing for Program Binaries and Components
53
X-Force: Force-Executing Binary Programs for Security Applications
54
BYTEWEIGHT: Learning to Recognize Functions in Binary Code
55
A Large-Scale Analysis of the Security of Embedded Firmwares
56
BinClone: Detecting Code Clones in Malware
57
Code completion with statistical language models
58
Tracelet-based code search in executables
60
Automatic exploit generation
61
Distributed Representations of Words and Phrases and their Compositionality
62
Engineering Efficient and Effective Non-metric Space Library
63
AnDarwin: Scalable Detection of Semantically Similar Android Applications
64
Revolver: An Automated Approach to the Detection of Evasive Web-based Malware
65
Towards Automatic Software Lineage Inference
66
Rendezvous: A search engine for binary code
67
BinSlayer: accurate comparison of binary executables
68
iBinHunt: Binary Hunting with Inter-procedural Control Flow
69
Random Search for Hyper-Parameter Optimization
70
Automatic analysis of malware behavior using machine learning
71
Automatic mining of functionally equivalent code fragments via random testing
72
QEMU, a Fast and Portable Dynamic Translator
73
K-gram based software birthmarks
74
Similarity Search in High Dimensions via Hashing
75
On Information and Sufficiency
76
DeepBinDiff: Learning Program-Wide Code Representations for Binary Diffing
77
When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features
78
Inc. Amazon Web Services
79
BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding
80
Coda: An End-to-End Neural Program Decompiler
81
Hikari – an improvement over Obfuscator-LLVM
82
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
83
Transcend: Detecting Concept Drift in Malware Classification Models
84
Neural Nets Can Learn Function Type Signatures From Binaries
85
Towards Automated Dynamic Analysis for Linux-based Embedded Firmware
86
discovRE: Efficient Cross-Architecture Identification of Bugs in Binary Code
87
Unicorn: Next generation cpu emulator framework
88
Dropout: a simple way to prevent neural networks from overfitting
89
Top 10 web application security risks
90
Scalable, Behavior-Based Malware Clustering
91
Digital Design and Computer Architecture
92
The PASCAL Recognising Textual Entailment Challenge
94
Book Reviews: Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics, and Speech Recognition
95
Computer Architecture: Pipelined and Parallel Processor Design
96
2008 IEEE Symposium on Security and Privacy Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
97
attention a is a square matrix, where each cell a ij indicates how much attention E l,i should pay E l,j when updating itself. It then divides every row of a √
98
are affine a fully-connected layer) parameterized respectively
99
by softmax to ensure them sum up to 1: a (cid:48) ij = exp( a ij ) (cid:80) nj =1 exp( a ij ) The scaled attention a (cid:48) will be multiplied
101
devttys0. Binwalk - Firmware Analysis Tool
103
self-attention layer updates each embedding with the following steps
104
q i = f q ( W q ; E l,i )