Sign in

Vestige: Identifying Binary Code Provenance for Vulnerability Detection.

Yuede JiLei CuiH. Howie Huang
Published in: ACNS (2) (2021)
Keyphrases
  • binary codes
  • object detection
  • hamming distance
  • multiscale
  • feature extraction
  • support vector
  • training set