Showing 1 - 20 results of 45 for search '"binary code"', query time: 0.07s Refine Results
  1. 1

    A Class of Binary Codes Using a Specific Automorphism Group by Driss Harzalla

    Published 2024-12-01
    “…In this article, we showcase <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>P</mi><mi>S</mi><mi>L</mi><mo>(</mo><mn>3</mn><mo>,</mo><mn>4</mn><mo>)</mo></mrow></semantics></math></inline-formula> as the automorphism group for a specific class of three linear binary codes, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>1</mn></msub></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>2</mn></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>3</mn></msub></semantics></math></inline-formula>, with dimension 9. …”
    Get full text
    Article
  2. 2

    Analysis model of binary code security flaws based on structure characteristics by Tuan XU, Lei-lei QU, Wen-chang SHI

    Published 2017-09-01
    “…Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.…”
    Get full text
    Article
  3. 3

    MSSA: multi-stage semantic-aware neural network for binary code similarity detection by Bangrui Wan, Jianjun Zhou, Ying Wang, Feng Chen, Ying Qian

    Published 2025-01-01
    “…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    MEASUREMENT OF THE AMPLITUDE OF PERIODIC SIGNALS USING THE FIBONACCI METHOD by V. S. Petrushak

    Published 2018-06-01
    “…Development of new methods and high-rate means for converting the amplitude of high-frequency periodic signals into a binary code with high speed for solving problems of industrial tomography, radar, radio navigation, during measurements of amplitude-frequency characteristics, measurement of the amplitude of signal generators is relevant in scientific terms and useful in practical applications. …”
    Get full text
    Article
  10. 10

    GMN+: A Binary Homologous Vulnerability Detection Method Based on Graph Matching Neural Network with Enhanced Attention by Zheng Zhao, Tianhao Zhang, Xiaoya Fan, Qian Mao, Dafeng Wang, Qi Zhao

    Published 2024-11-01
    “…Deep learning has emerged as a promising approach for detecting homologous vulnerabilities in binary code due to their automated feature extraction and high efficiency. …”
    Get full text
    Article
  11. 11

    基于透视不变二值特征描述子的图像匹配算法 by Li-chuan GENG, Song-zhi SU, Shao-zi LI

    Published 2015-04-01
    “…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
    Get full text
    Article
  12. 12

    Using coverage analysis to extract Botnet command-and-control protocol by Zhi WANG, Ya-yun CAI, Lu LIU, Chun-fu JIA

    Published 2014-01-01
    “…There are some inherent patterns in the bot execution trace coverage of basic blocks.Using these patterns,an approach was proposed to infer Botnet command-and-control protocol (C&amp;amp;C protocol).Without intermediate representation of binary code and constraints solving,this approach has a lower time and space overhead.This coverage analysis approach was evaluated on 3 famous Botnet:Zeus,Sdbot and Agobot.The result shows that this approach can accurately and efficiently extract the Botnet control commands.And the completeness of the extracted control commands could be verified by checking whether all available basic blocks in bot are covered by the traces triggered by the control commands.…”
    Get full text
    Article
  13. 13

    EFH:an online unsupervised hash learning algorithm by Zhenyu SHOU, Jiangbo QIAN, Yihong DONG, Huahui CHEN

    Published 2020-03-01
    “…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
    Get full text
    Article
  14. 14

    Research progress in code reuse attacking and defending by Xiangdong QIAO, Rongxiao GUO, Yong ZHAO

    Published 2018-03-01
    “…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
    Get full text
    Article
  15. 15

    Survey on static software vulnerability detection for source code by Zhen LI, Deqing ZOU, Zeli WANG, Hai JIN

    Published 2019-02-01
    “…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
    Get full text
    Article
  16. 16

    Some results on free Euclidean self-dual codes over F2+vF2 by Refia Aksoy, Fatma Çalışkan

    Published 2019-12-01
    “…By using the distance preserving Gray map fromF2+ v F2to F2xF2,the generator matrix of the binary code which corresponds the code over theringF2+ v F2is obtained. …”
    Get full text
    Article
  17. 17

    LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY by Ramona DUMITRAȘCU

    Published 2017-05-01
    “…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.…”
    Get full text
    Article
  18. 18

    Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices by Maxim Kalinin, Nikita Gribkov

    Published 2024-11-01
    “…This has a positive impact on the ability to apply the proposed method to large sets of binary code. In an experimental study, the developed method—compared to BinDiff, Gemini, and Asteria tools—has demonstrated the highest efficiency.…”
    Get full text
    Article
  19. 19

    Artificial fingerprints engraved through block-copolymers as nanoscale physical unclonable functions for authentication and identification by Irdi Murataj, Chiara Magosso, Stefano Carignano, Matteo Fretto, Federico Ferrarese Lupi, Gianluca Milano

    Published 2024-12-01
    “…Results show that morphological features can be exploited to encode fingerprint-like nanopatterns in binary code matrices representing a unique bit stream of information characterized by high uniqueness and entropy. …”
    Get full text
    Article
  20. 20

    Measurements of Periodic Signals Phase Shifts with Application of Direct Digital Synthesis by I. V. Gula, O. I. Polikarovskykh, K. I. Horiashchenko, I. V. Karpova, V. M. Melnychuk

    Published 2019-06-01
    “…The use of statistical accumulation of pulse coincidence in the basis of the work allowed eliminating the restrictions on the duration of pulses of known non-ionic meters.On the basis of the obtained results, a high-bit converter of phase shifts of high-frequency periodic signals into a binary code with high speed for problems of industrial tomography, radar and radionavigation can be developed.…”
    Get full text
    Article