Jan. 3, 2023, 2:10 a.m. | Shouguo Yang, Chaopeng Dong, Yang Xiao, Yiran Cheng, Zhiqiang Shi, Zhi Li, Limin Sun

cs.CR updates on arXiv.org arxiv.org

The widespread code reuse allows vulnerabilities to proliferate among a vast
variety of firmware. There is an urgent need to detect these vulnerable code
effectively and efficiently. By measuring code similarities, AI-based binary
code similarity detection is applied to detecting vulnerable code at scale.
Existing studies have proposed various function features to capture the
commonality for similarity detection. Nevertheless, the significant code
syntactic variability induced by the diversity of IoT hardware architectures
diminishes the accuracy of binary code similarity detection. …

binary code code reuse detect detection domain effectively firmware knowledge measuring pro reuse scale similarity studies urgent vast vulnerabilities vulnerable

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Engineer, Incident Response

@ Databricks | Remote - Netherlands

Associate Vulnerability Engineer - Mid-Atlantic region (Part-Time)

@ GuidePoint Security LLC | Remote in VA, MD, PA, NC, DE, NJ, or DC

Data Security Architect

@ Accenture Federal Services | Washington, DC

Identity Security Administrator

@ SailPoint | Pune, India