May 19, 2023, 1:10 a.m. | Sun RuiJin, Guo ShiZe, Guo Xi, Pan ZhiSong

cs.CR updates on arXiv.org arxiv.org

The ability to compute similarity scores of binary code at the function level
is essential for cyber security. A single binary file can contain tens of
thousands of functions. A deployable learning framework for cybersecurity
applications needs to work not only accurately but also efficiently with large
amounts of data. Traditional methods suffer from two drawbacks. First, it is
very difficult to annotate different pairs of functions with accurate labels.
These supervised learning methods can easily be overtrained with inaccurate …

applications binary code compute cyber cyber security cybersecurity file framework function functions information large momentum representation scale security similarity single work

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Security Solution Architect

@ Civica | London, England, United Kingdom

Information Security Officer (80-100%)

@ SIX Group | Zurich, CH

Cloud Information Systems Security Engineer

@ Analytic Solutions Group | Chantilly, Virginia, United States

SRE Engineer & Security Software Administrator

@ Talan | Mexico City, Spain