-
1
A Class of Binary Codes Using a Specific Automorphism Group
Published 2024-12-01“…In this article, we showcase <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>P</mi><mi>S</mi><mi>L</mi><mo>(</mo><mn>3</mn><mo>,</mo><mn>4</mn><mo>)</mo></mrow></semantics></math></inline-formula> as the automorphism group for a specific class of three linear binary codes, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>1</mn></msub></semantics></math></inline-formula>, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>2</mn></msub></semantics></math></inline-formula> and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msub><mi>C</mi><mn>3</mn></msub></semantics></math></inline-formula>, with dimension 9. …”
Get full text
Article -
2
Analysis model of binary code security flaws based on structure characteristics
Published 2017-09-01“…Aiming at the shortcomings of the existing methods to detect the security flaws that have complex structures,a new analysis model and its application method was proposed.First,analysis models based on key information of code structures extracted from path subsets of characteristic element sets that are generated by source code element sets of code security flaws were constructed.Then the analysis model according to the statistical probability of each kind of IR statement was calculated,and the IR code group which matched the feature model was found.Finally,through the translating relation between binary codes and IR codes,various code security flaws of binary program were found out.The analysis models can be applied to both common single-process binary programs and binary parallel programs.Experimental results show that compared with the existing methods,the application of the analysis model can be more comprehensive and in-depth in detecting various types of complex binary code security flaws with higher accuracy.…”
Get full text
Article -
3
MSSA: multi-stage semantic-aware neural network for binary code similarity detection
Published 2025-01-01“…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
Get full text
Article -
4
-
5
Information sets as permutation cycles for quadratic residue codes
Published 1982-01-01Subjects: “…binary code…”
Get full text
Article -
6
Adversarial Attacks Against Binary Similarity Systems
Published 2024-01-01Subjects: Get full text
Article -
7
Chirality-modulated photonic spin Hall effect in PT-symmetry
Published 2022-06-01Subjects: “…binary coding…”
Get full text
Article -
8
-
9
MEASUREMENT OF THE AMPLITUDE OF PERIODIC SIGNALS USING THE FIBONACCI METHOD
Published 2018-06-01“…Development of new methods and high-rate means for converting the amplitude of high-frequency periodic signals into a binary code with high speed for solving problems of industrial tomography, radar, radio navigation, during measurements of amplitude-frequency characteristics, measurement of the amplitude of signal generators is relevant in scientific terms and useful in practical applications. …”
Get full text
Article -
10
GMN+: A Binary Homologous Vulnerability Detection Method Based on Graph Matching Neural Network with Enhanced Attention
Published 2024-11-01“…Deep learning has emerged as a promising approach for detecting homologous vulnerabilities in binary code due to their automated feature extraction and high efficiency. …”
Get full text
Article -
11
基于透视不变二值特征描述子的图像匹配算法
Published 2015-04-01“…Current local feature based image matching algorithms are usually less robust to image perspective transformation.Aiming to solve this problem,a new perspective invariant binary code (PIBC) based image matching algorithm is proposed.Firstly,FAST corners are detected on the pyramid images,those corners with non-maximum Harris corner response value and the edge points are further eliminated.And then,by simulating the perspective transformations of images taken from different viewpoints,a single FAST corner is described with binary descriptors under different viewpoint transformations,which makes the descriptor could describe the identical feature point on different perspective transform images.Experimental results show its robustness to image perspective transformation,while its complexity is similar with SURF.…”
Get full text
Article -
12
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01“…There are some inherent patterns in the bot execution trace coverage of basic blocks.Using these patterns,an approach was proposed to infer Botnet command-and-control protocol (C&amp;C protocol).Without intermediate representation of binary code and constraints solving,this approach has a lower time and space overhead.This coverage analysis approach was evaluated on 3 famous Botnet:Zeus,Sdbot and Agobot.The result shows that this approach can accurately and efficiently extract the Botnet control commands.And the completeness of the extracted control commands could be verified by checking whether all available basic blocks in bot are covered by the traces triggered by the control commands.…”
Get full text
Article -
13
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01“…Many unsupervised learning to hash algorithm needs to load all data to memory in the training phase,which will occupy a large memory space and cannot be applied to streaming data.An unsupervised online learning to hash algorithm called evolutionary forest hash (EFH) was proposed.In a large-scale data retrieval scenario,the improved evolution tree can be used to learn the spatial topology of the data.A path coding strategy was proposed to map leaf nodes to similarity-preserved binary code.To further improve the querying performance,ensemble learning was combined,and an online evolving forest hashing method was proposed based on the evolving trees.Finally,the feasibility of this method was proved by experiments on two widely used data sets.…”
Get full text
Article -
14
Research progress in code reuse attacking and defending
Published 2018-03-01“…Code reuse attacks make use of binary code existed in the attacked target to perform attack action,such technique breaks out the traditional assumption that malicious behavior always be introduced from the outside,it is representative sample of the advanced memory corruption techniques and also the focus of attention in the software security research field.The generation background and implementation principle were described firstly,and then the recent progresses of the technique,including improvement and variants,implementation methods under the different architecture platforms,automatic construction and important extension including blind ROP and non-control data attacks based on code reuse attacks,were introduced respectively.Various defense mechanisms and possible counter-defense methods for code reuse attacks were also discussed.Finally a perspective of the future work in this research area was discussed.…”
Get full text
Article -
15
Survey on static software vulnerability detection for source code
Published 2019-02-01“…Static software vulnerability detection is mainly divided into two types according to different analysis objects:vulnerability detection for binary code and vulnerability detection for source code.Because the source codecontains more semantic information,it is more favored by code auditors.The existing vulnerability detection research works for source code are summarized from four aspects:code similarity-based vulnerability detection,symbolic execution-based vulnerability detection,rule-based vulnerability detection,and machine learning-based vulnerability detection.The vulnerability detection system based on source code similarity and the intelligent software vulnerability detection system for source code are taken as two examples to introduce the process of vulnerability detection in detail.…”
Get full text
Article -
16
Some results on free Euclidean self-dual codes over F2+vF2
Published 2019-12-01“…By using the distance preserving Gray map fromF2+ v F2to F2xF2,the generator matrix of the binary code which corresponds the code over theringF2+ v F2is obtained. …”
Get full text
Article -
17
LI-FI TECHNOLOGY AND THE NEW CONCEPT OF DATA TRANSFER SECURITY
Published 2017-05-01“…It works basically like an incredibly advanced form of Morse code - flicking an LED on and off at extreme speeds and can be used to write and transmit things in binary code. The benefit of Li-Fi over Wi-Fi, other than potentially much faster speeds, is that because light cannot pass through walls, it makes it a whole lot more secure.…”
Get full text
Article -
18
Syntactic–Semantic Detection of Clone-Caused Vulnerabilities in the IoT Devices
Published 2024-11-01“…This has a positive impact on the ability to apply the proposed method to large sets of binary code. In an experimental study, the developed method—compared to BinDiff, Gemini, and Asteria tools—has demonstrated the highest efficiency.…”
Get full text
Article -
19
Artificial fingerprints engraved through block-copolymers as nanoscale physical unclonable functions for authentication and identification
Published 2024-12-01“…Results show that morphological features can be exploited to encode fingerprint-like nanopatterns in binary code matrices representing a unique bit stream of information characterized by high uniqueness and entropy. …”
Get full text
Article -
20
Measurements of Periodic Signals Phase Shifts with Application of Direct Digital Synthesis
Published 2019-06-01“…The use of statistical accumulation of pulse coincidence in the basis of the work allowed eliminating the restrictions on the duration of pulses of known non-ionic meters.On the basis of the obtained results, a high-bit converter of phase shifts of high-frequency periodic signals into a binary code with high speed for problems of industrial tomography, radar and radionavigation can be developed.…”
Get full text
Article