-
181
Position Distribution Matters: A Graph-Based Binary Function Similarity Analysis Method
Published 2022-08-01“…First, an enhanced Attributed Control Flow Graph (ACFG+) of a function is constructed based on a control flow graph, assisted by the instruction embedding technique and data flow analysis. …”
Get full text
Article -
182
Neural Network-based Binary Function Similarity Detection
Published 2021-10-01“…Binary code similarity detection has extensive and important applications in program traceability and security audit.In recent years,the application of neural network technology in binary code similarity detection has broken through the performance bottleneck encountered by traditional detection techno-logy in large-scale detection tasks,making code similarity detection technology based on neural network embedding gradually become a research hotspot.This paper proposes a neural network-based binary function similarity detection technology.This paper first uses a uniform intermediate representation to eliminate the diffe-rences in instruction architecture of assembly code.Secondly,at the basic block level,it uses a word embedding model in natural language processing to learn the intermediate representation code and obtain the basic block semantic embedding.Then,at the function level,it uses an improved graph neural network model to learn the control flow information of the function,taking consideration of the basic block semantics at the same time,and to obtain the final function embedding.Finally,the similarity between two functions is measured by calculating the cosine distance between the two function embeddingvectors.This paper also implements a prototype system based on this technology.Experiments show that the program code representation learning process of this technology can avoid the introduction of human bias,the improved graph neural network is more suitable for learning the control flow information of functions,and the scalability and detection accuracy of our system are both improved,compared with the existing schemes.…”
Get full text
Article -
183
Implementing a high-efficiency similarity analysis approach for firmware code.
Published 2021-01-01“…Among the basic blocks, the local control flow graphs are analyzed to obtain their similarity. …”
Get full text
Article -
184
Input data generation for reaching specific function in program by iterative dynamic analysis
Published 2018-10-01“…Using the reduced control-flow graph of program which contain only calls and conditional jumps directions which lead to the function of interest we built the metric of best next analysis direction. …”
Get full text
Article -
185
Slicing aspect-oriented program using aspect- oriented dependence flow graph for software maintenance
Published 2016“…In general, program slicing can be performed either based on control flow graph (CFG) or dependence graph (DG). However, in the case of aspect-oriented programming (AOP), aspect-oriented control flow graph (AOCFG) or aspect-oriented dependence graph (AODG) individually is not enough to model the features of Aspectoriented (AO) programs. …”
Get full text
Thesis -
186
The Control System Design for a Central Purifying Water Treatment in Hospital
Published 2015-12-01“…The system structure control flow charts using King view and S7-200 siemens programmable controller is given. …”
Get full text
Article -
187
PERANCANGAN DAN PEMBUATAN CASE TOOL SOFTWARE TESTING MENGGUNAKAN METODE STATIC DATA FLOW ANALYSIS (STUDI KASUS POGRAM BERBASIS C++)
Published 2005-01-01“…Dari graph inilah dapat dicari keberadaan data flow anomaly dalam fungsi dan dibuat visualisasi aliran program dalam suatu control flow graph. Tahap terakhir yang dilakukan adalah uji coba dan evaluasi.…”
Get full text
Article -
188
AAPFE: Aligned Assembly Pre-Training Function Embedding for Malware Analysis
Published 2022-03-01“…Current solutions focus on embedding instructions or basic block sequences into vectors with recurrent neural network models or utilizing a graph algorithm on control flow graphs or annotated control flow graphs to generate binary representation vectors. …”
Get full text
Article -
189
Binary code similarity analysis based on naming function and common vector space
Published 2023-09-01“…Based on deep learning and natural processing techniques, several approaches have been proposed to perform cross-platform binary code similarity analysis using control flow graphs. However, existing schemes suffer from the shortcomings of large differences in instruction syntaxes across different target platforms, inability to align control flow graph nodes, and less introduction of high-level semantics of stability, which pose challenges for identifying similar computations between binary functions of different platforms generated from the same source code. …”
Get full text
Article -
190
Improving Comprehension: Intelligent Tutoring System Explaining the Domain Rules When Students Break Them
Published 2021-11-01“…We developed two subject domain models: an Expressions domain for teaching the expression order of evaluation, and a Control Flow Statements domain for code-tracing tasks. …”
Get full text
Article -
191
Petri Net Based Data-Flow Error Detection and Correction Strategy for Business Processes
Published 2020-01-01“…Conceptual modeling, which includes both control-flow and data-flow modeling, has posed great challenges for conventional business process management systems. …”
Get full text
Article -
192
Firmware Vulnerability Detection Algorithm Based on Matching Pattern-Specific Numerical Features With Structural Features
Published 2024-01-01“…The experimental results showed that the Top1 index value of the five-layer local call graph ranges from 81.99 to 90.19. The indexes of control flow chart and attribute control flow chart fluctuated greatly, ranging from 61.57 to 91.08 and 54.62 to 87.55, respectively. …”
Get full text
Article -
193
Towards an interpreter for efficient encrypted computation
Published 2014“…We describe how path levelization reduces control flow ambiguity and improves encrypted computation efficiency. …”
Get full text
Get full text
Get full text
Get full text
Article -
194
Research on Travel Control System of Hydrostatic Transmission Chassis
Published 2017-01-01“…According to the number of driving axles in driving process, The external characteristic curve of the engine controls the variable hydraulic pump by one parameter, controls the rotational speed of the variable hydraulic motor according to the change of the vehicle speed, and introduces the control flow of the brake system. It provides a reference for the design of driving control system of multi-axis hydrostatic transmission chassis.…”
Get full text
Article -
195
Analyzing Flowgraphs with ATL
Published 2013-11-01“…Starting from Java source code, we execute a chain of model transformations to derive a simplified model of the program, its control flow graph and its data flow graph. Finally we develop a model transformation that validates the program flow by comparing it with a set of flow specifications written in a domain specific language. …”
Get full text
Article -
196
Programming in the Sleptsov net language for systems control
Published 2016-03-01“…In this article, the principles of programming in the Sleptsov net language are further developed with respect to the restrictions on the control flow and its composition with data. The conditions of correctness of Sleptsov net programs are formulated in the form of additional restrictions on copying parameters of modules and using global variables. …”
Get full text
Article -
197
A Survey of Search Strategies in the Dynamic Symbolic Execution
Published 2017-01-01“…This paper reviews and compares the main search strategies of DSE in recent years, including the Generational strategy, CarFast, Control-Flow Directed Search, Fitness-Guided Search strategy, Context-Guided Search strategy, RWset technique and Veritesting.…”
Get full text
Article -
198
Secure Execution Via Program Shepherding
Published 2023“…We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security policy. …”
Get full text
-
199
Design of Dedusting System of Coal Preparation Plant Based on PLC and Its Implementatio
Published 2010-10-01“…According to practical situation of a coal preparation plant in Xinjiang, it proposed a design scheme of dedusting system based on PLC, DH+ networking mode and ultrasonic atomization technology with negative pressure, and introduced the system's whole structure, hardware composition, control flow and design of communication program in details. …”
Get full text
Article -
200
Design of intelligent control system for continuous gangue discharging of whole rock roadway based on PLC
Published 2014-07-01“…Functional requirements of the system were introduced, and overall control scheme and control flow of the system were analyzed in details. …”
Get full text
Article