Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978370
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Graph-based Bug Search for Firmware Images

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
323
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 318 publications
(349 citation statements)
references
References 35 publications
0
323
0
Order By: Relevance
“…Machine learning based approaches. Machine learning, including deep learning, has been applied to code analysis [10], [38], [21], [62], [50], [43], [51], [29], [59], [28], [52], [27], [17]. Lee et al propose Instruction2vec for converting assembly instructions to vector representations [38]; but their instruction embedding model can only work on a single architecture.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Machine learning based approaches. Machine learning, including deep learning, has been applied to code analysis [10], [38], [21], [62], [50], [43], [51], [29], [59], [28], [52], [27], [17]. Lee et al propose Instruction2vec for converting assembly instructions to vector representations [38]; but their instruction embedding model can only work on a single architecture.…”
Section: Related Workmentioning
confidence: 99%
“…A few works target cross-architecture binary code analysis [21], [62], [8], [67]. Some exploit the statistical aspects of code, rather than its semantics.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations