Pengzhi Xu1,2, Zetian Mai1,2, Yuhao Lin1, Zhen Guo1,2,*, Victor S. Sheng3
Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 165-179, 2021, DOI:10.32604/jihpp.2021.027280
- 22 March 2022
Abstract With the increase of software complexity, the security threats faced by
the software are also increasing day by day. So people pay more and more
attention to the mining of software vulnerabilities. Although source code has rich
semantics and strong comprehensibility, source code vulnerability mining has been
widely used and has achieved significant development. However, due to the
protection of commercial interests and intellectual property rights, it is difficult to
obtain source code. Therefore, the research on the vulnerability mining technology
of binary code has strong practical value. Based on the investigation of related
technologies,… More >