CN115934090B - 一种由二进制代码转换源代码的方法 - Google Patents
一种由二进制代码转换源代码的方法 Download PDFInfo
- Publication number
- CN115934090B CN115934090B CN202310010274.8A CN202310010274A CN115934090B CN 115934090 B CN115934090 B CN 115934090B CN 202310010274 A CN202310010274 A CN 202310010274A CN 115934090 B CN115934090 B CN 115934090B
- Authority
- CN
- China
- Prior art keywords
- binary
- source code
- model
- representation
- intermediate representation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000012549 training Methods 0.000 claims abstract description 29
- 230000006870 function Effects 0.000 claims description 13
- 238000000605 extraction Methods 0.000 claims description 5
- 238000006467 substitution reaction Methods 0.000 claims description 5
- 238000010276 construction Methods 0.000 claims description 3
- 239000012634 fragment Substances 0.000 claims description 3
- 239000000203 mixture Substances 0.000 claims description 3
- 230000015654 memory Effects 0.000 claims description 2
- 238000012163 sequencing technique Methods 0.000 claims description 2
- 238000004458 analytical method Methods 0.000 abstract description 28
- 230000008569 process Effects 0.000 abstract description 9
- 238000010801 machine learning Methods 0.000 description 5
- 238000013528 artificial neural network Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000002457 bidirectional effect Effects 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000013135 deep learning Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006403 short-term memory Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000000306 recurrent effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
Images
Landscapes
- Devices For Executing Special Programs (AREA)
- Stored Programmes (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310010274.8A CN115934090B (zh) | 2023-01-05 | 2023-01-05 | 一种由二进制代码转换源代码的方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310010274.8A CN115934090B (zh) | 2023-01-05 | 2023-01-05 | 一种由二进制代码转换源代码的方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115934090A CN115934090A (zh) | 2023-04-07 |
CN115934090B true CN115934090B (zh) | 2023-05-23 |
Family
ID=85828702
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310010274.8A Active CN115934090B (zh) | 2023-01-05 | 2023-01-05 | 一种由二进制代码转换源代码的方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115934090B (zh) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733137A (zh) * | 2020-12-24 | 2021-04-30 | 哈尔滨工业大学 | 一种面向漏洞检测的二进制代码相似性分析方法 |
CN113722218A (zh) * | 2021-08-23 | 2021-11-30 | 南京审计大学 | 一种基于编译器中间表示的软件缺陷预测模型构建方法 |
CN115168856A (zh) * | 2022-07-29 | 2022-10-11 | 山东省计算中心(国家超级计算济南中心) | 二进制代码相似性检测方法及物联网固件漏洞检测方法 |
CN115563627A (zh) * | 2022-12-06 | 2023-01-03 | 中国电子科技集团公司第三十研究所 | 一种基于人机协同的二进制程序漏洞静态分析方法 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8832672B2 (en) * | 2011-01-28 | 2014-09-09 | International Business Machines Corporation | Ensuring register availability for dynamic binary optimization |
US10761841B2 (en) * | 2018-10-17 | 2020-09-01 | Denso International America, Inc. | Systems and methods for identifying source code from binaries using machine learning |
US10656940B1 (en) * | 2019-02-04 | 2020-05-19 | Architecture Technology Corporation | Systems, devices, and methods for source code generation from binary files |
CN111475820B (zh) * | 2020-04-28 | 2023-08-01 | 张皓天 | 基于可执行程序的二进制漏洞检测方法、系统及存储介质 |
US11900086B2 (en) * | 2020-10-20 | 2024-02-13 | Battelle Energy Alliance, Llc | Systems and methods for architecture-independent binary code analysis |
CN115455382A (zh) * | 2022-08-11 | 2022-12-09 | 武汉大学 | 一种二进制函数代码的语义比对方法及装置 |
-
2023
- 2023-01-05 CN CN202310010274.8A patent/CN115934090B/zh active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733137A (zh) * | 2020-12-24 | 2021-04-30 | 哈尔滨工业大学 | 一种面向漏洞检测的二进制代码相似性分析方法 |
CN113722218A (zh) * | 2021-08-23 | 2021-11-30 | 南京审计大学 | 一种基于编译器中间表示的软件缺陷预测模型构建方法 |
CN115168856A (zh) * | 2022-07-29 | 2022-10-11 | 山东省计算中心(国家超级计算济南中心) | 二进制代码相似性检测方法及物联网固件漏洞检测方法 |
CN115563627A (zh) * | 2022-12-06 | 2023-01-03 | 中国电子科技集团公司第三十研究所 | 一种基于人机协同的二进制程序漏洞静态分析方法 |
Non-Patent Citations (1)
Title |
---|
基于神经机器翻译的二进制函数相似性检测方法;陈斌;《信息工程大学学报》;第22卷(第6期);675-682 * |
Also Published As
Publication number | Publication date |
---|---|
CN115934090A (zh) | 2023-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Deepfuzz: Automatic generation of syntax valid c programs for fuzz testing | |
Watson et al. | On learning meaningful assert statements for unit test cases | |
CN112733137B (zh) | 一种面向漏洞检测的二进制代码相似性分析方法 | |
Jeon et al. | AutoVAS: An automated vulnerability analysis system with a deep learning approach | |
Zhang et al. | Unifying the perspectives of nlp and software engineering: A survey on language models for code | |
Si et al. | Learning a meta-solver for syntax-guided program synthesis | |
CN108027748A (zh) | 指令集模拟器及其模拟器生成方法 | |
Xu et al. | Dsmith: Compiler fuzzing through generative deep learning model with attention | |
Zheng et al. | CodeAttention: translating source code to comments by exploiting the code constructs | |
Chen et al. | Supersonic: Learning to generate source code optimizations in C/C++ | |
Wen et al. | Babeltower: Learning to auto-parallelized program translation | |
Balbiani et al. | A dynamic logic for termgraph rewriting | |
CN115934090B (zh) | 一种由二进制代码转换源代码的方法 | |
Xu et al. | Tree2tree structural language modeling for compiler fuzzing | |
Chen et al. | Learning to improve code efficiency | |
Khodadadi et al. | Hymo: Vulnerability detection in smart contracts using a novel multi-modal hybrid model | |
CN116841869A (zh) | 基于代码结构化信息及审查知识的Java代码审查评论生成方法及装置 | |
Zhou et al. | Survey of intelligent program synthesis techniques | |
Duy et al. | VulnSense: Efficient Vulnerability Detection in Ethereum Smart Contracts by Multimodal Learning with Graph Neural Network and Language Model | |
Hanifi et al. | Software Vulnerability Prediction Knowledge Transferring Between Programming Languages | |
Yan et al. | LSTM-based with deterministic negative sampling for API suggestion | |
Meng et al. | Binary code multi-author identification in multi-toolchain scenarios | |
Liang et al. | Semantics-recovering decompilation through neural machine translation | |
Shao et al. | A survey of available information recovery of binary programs based on machine learning | |
Escalada et al. | An adaptable infrastructure to generate training datasets for decompilation issues |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Shandong computing center, No.19 Keyuan Road, Lixia District, Jinan City, Shandong Province 250014 Patentee after: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN) Patentee after: Qilu University of Technology (Shandong Academy of Sciences) Address before: Shandong computing center, No.19 Keyuan Road, Lixia District, Jinan City, Shandong Province 250014 Patentee before: SHANDONG COMPUTER SCIENCE CENTER(NATIONAL SUPERCOMPUTER CENTER IN JINAN) Patentee before: Qilu University of Technology |