Proceedings of the 13th Workshop on Programming Languages and Analysis for Security 2018
DOI: 10.1145/3264820.3264821
|View full text |Cite
|
Sign up to set email alerts
|

Binary Similarity Detection Using Machine Learning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(13 citation statements)
references
References 8 publications
0
13
0
Order By: Relevance
“…In order to better perform the embedding learning of word vectors, literature [15] introduces a new vector representation method proc2vec. First, split the program assembly code into basic blocks and use the strands that compose a code section as feature set, transforming strands to numbers and assembling those numbers to form a vector that represents the corresponding code.…”
Section: Semantic-based Clone Detection Methodsmentioning
confidence: 99%
“…In order to better perform the embedding learning of word vectors, literature [15] introduces a new vector representation method proc2vec. First, split the program assembly code into basic blocks and use the strands that compose a code section as feature set, transforming strands to numbers and assembling those numbers to form a vector that represents the corresponding code.…”
Section: Semantic-based Clone Detection Methodsmentioning
confidence: 99%
“…Li et al [28] extracted tokens from known methodlevel code clones and non-clones to train a 6-layerd perceptron, and then used the classifier to detect syntactic clones. Shalev and Partush [29] detected similarities between code blocks by breaking them up into smaller regions of a few lines of assembly code; normalizing these code regions; obtaining small sized MD5 hashes of the regions; creating a fixed size hash for a code block; and then training a 4-layered perceptron to detect if two code blocks are clones. Wei and Ming [30] developed an end-to-end approach to detect Type IV clones, using Long Short Term Memory (LSTMs), a special type of RNNs.…”
Section: B Machine Learning In Clone Detectionmentioning
confidence: 99%
“…Learning-Based Analysis. In recent years, there has been significant research on applying learning-based techniques such as machine learning [30,37,42], deep neural networks [33,48], and natural language processing [50] for similarity detection. Although learning-based methods are efficient and show promising results, they require extraneous training of an available dataset.…”
Section: Static and Dynamic Analysismentioning
confidence: 99%
“…The state-of-the-art provides various techniques to compare two binaries [7,12,33,35,39,42,50]. A broad class of the comparison techniques is statistical or learning-based [13,48,50].…”
Section: Introductionmentioning
confidence: 99%