Synthetic Datasets for Program Similarity Research.
CoRR, 2024
COBRA-GCN: Contrastive Learning to Optimize Binary Representation Analysis with Graph Convolutional Networks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2022
LAVA: Large-Scale Automated Vulnerability Addition.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Flowtables: Program Skeletal Inversion for Defeat of Interprocedural Analysis with Unique Metamorphism.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
Repeatable Reverse Engineering with PANDA.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015
Architecture-Independent Dynamic Information Flow Tracking.
Proceedings of the Compiler Construction - 22nd International Conference, 2013
Toward Whole-System Dynamic Analysis for ARM-Based Mobile Devices.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010