Yikun's Homepage
Yikun's Homepage
About
News
Publications
Teaching
Light
Dark
Automatic
2
Binary Cryptographic Function Identification via Similarity Analysis with Path-Insensitive Emulation
It becomes an essential requirement to identify cryptographic functions in binaries due to their widespread application in modern …
Yikun Hu
,
Yituo He
,
Wenyu He
,
Haoran Li
,
Yubo Zhao
,
Shuai Wang
,
Dawu Gu
PDF
Cite
DOI
URL
StrTune: Data Dependence-based Code Slicing for Binary Similarity Detection with Fine-tuned Representation
Binary Code Similarity Detection (BCSD) is significant for software security as it can address binary tasks such as malicious code …
Kaiyan He
,
Yikun Hu
,
Xuehui Li
,
Yunhao Song
,
Yubo Zhao
,
Dawu Gu
PDF
Cite
DOI
URL
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation
Binary code similarity analysis is extremely useful, since it provides rich information about an unknown binary, such as revealing its …
Anshunkang Zhou
,
Yikun Hu
,
Xiangzhe Xu
,
Charles Zhang
PDF
Cite
DOI
URL
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison
Binary code similarity comparison is a methodology for identifying similar or identical code fragments in binary programs. It is …
Yikun Hu
,
Hui Wang
,
Yuanyuan Zhang
,
Bodong Li
,
Dawu Gu
PDF
Cite
DOI
URL
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions
The security of binary programs is significantly threatened by software vulnerabilities. When vulnerabilities are found, those …
Yikun Hu
,
Yuanyuan Zhang
,
Dawu Gu
PDF
Cite
DOI
Cite
×