#BinaryAnalysis
Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (www.acsac.org/2024/p...) 5/6
#Cybersecurity #BinaryAnalysis
October 16, 2025 at 2:02 PM
AGNOMIN improved precision by up to 27.17% and recall by up to 55.86% on 9,000 ELF binaries across three architectures, and added a 5.89% recall gain on unseen architectures. Read more: https://getnews.me/agnomin-introduces-architecture-agnostic-multi-label-function-naming/ #agnomin #binaryanalysis
October 3, 2025 at 12:00 PM
ContraBin, a learning framework, embeds source code, comments and binary fragments. Synthetic comments improve embedding quality, while human comments may reduce performance. Read more: https://getnews.me/contrabin-contrastive-learning-boosts-binary-code-analysis/ #contrabin #binaryanalysis
September 29, 2025 at 6:30 PM
fwiw,

#Akai #MPD218 Preset File Format (.mpd218)

akai-mpd218_preset_file_format.md

gist.github.com/mxmilkiib/018f4a55a529640427a29f143a3978d3

generated by Claude Sonnet + GPT-5 (high reasoning)

#midi #controller #sysex #controllerism #fileformat #binaryanalysis #djing #creativecoding
Akai MPD218 Preset File Format (.mpd218)
Akai MPD218 Preset File Format (.mpd218). GitHub Gist: instantly share code, notes, and snippets.
gist.github.com
September 27, 2025 at 6:08 PM
In this #OpenAccess article, methods of translating malicious code (#Microcode, #PCode, #LLIL) were tested to see their impact on #malware detection, showing how choices affect accuracy, #data needs, and model performance.

Read: bit.ly/4glKiLs
#MachineLearning #BinaryAnalysis #OpenScience #ACRT
September 10, 2025 at 12:40 PM
Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries.

In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface.

#IoT
July 29, 2025 at 11:51 PM
Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork.

In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis.

Visibility matters.
July 18, 2025 at 10:15 PM
Still relying on outdated security tools?

👎 No binary scanning
🕳️ Incomplete #SBOMs
📉 Missed vulnerabilities

Here are 6 signs it's time to upgrade & what to look for 👉 finitestate.io/blog/when-to...

#ProductSecurity #IoTSecurity #SBOM #BinaryAnalysis #DevSecOps #SCA #SAST
5 Signs Your Product Security Program Has Outgrown Its Current Tools
Your product security stack shouldn’t hold you back. Here are 5 signs it's time to scale beyond homegrown tools and manual SBOMs.
finitestate.io
June 23, 2025 at 9:42 PM
Why do so many vulnerabilities slip past traditional scanning tools?

In our latest blog, we explore the blind spots in traditional SCA/SAST & how Finite State helps teams uncover what others miss 👉https://t.co/R9giOUBz2E

#IoTSecurity #ProductSecurity #BinaryAnalysis #SCA #SAST
Risks of Incomplete Security Scanning Across IoT Product Lifecycles
Incomplete scan coverage leaves critical IoT vulnerabilities hidden. Learn how to close DevSecOps gaps and meet global security regulations.
t.co
June 17, 2025 at 4:39 PM
DWARF also enables symbolicated backtraces and setting line-level breakpoints, making complex binary analysis much clearer in GDB. #BinaryAnalysis 3/6
May 29, 2025 at 12:00 PM
Legacy security testing leaves mobile apps vulnerable to third-party risks. Without deeper binary analysis, attackers can exploit blind spots in the software supply chain. jpmellojr.blogspot.com/2025/05/mobi... #AppSec #MobileSecurity #BinaryAnalysis #SecurityTesting
Mobile and third-party risk: How legacy testing leaves you exposed
Risks to software supply chains from mobile applications are increasing, largely due to a lack of deep visibility into the software's codeb...
jpmellojr.blogspot.com
May 2, 2025 at 3:57 PM
Changes to the CVE program signal a critical moment for AppSec strategies. It's time to modernize your approach to risk management. jpmellojr.blogspot.com/2025/04/chan... #CVE #NVD #AppSec #BinaryAnalysis #RiskManagement #SoftwareSecurity
Changes to CVE program are a call to action on your AppSec strategy
For the countless organizations that have relied on CVEs and the National Vulnerability Database to support vulnerability management and c...
jpmellojr.blogspot.com
April 24, 2025 at 3:49 PM
Introducing Nova (ICLR’25), foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. Preprint: arxiv.org/pdf/2311.13721

#LLM4Code #LLM #BinaryAnalysis #Security

@cerias.bsky.social @iclr-conf.bsky.social
January 28, 2025 at 7:08 PM
Unlock binary cracking with the r2ai tool in the radare2 framework. It enhances analysis by simulating human reasoning and automatically detecting errors. Stay aware of compatibility issues and best practices for optimal results. #cybersecurity #threat #binaryanalysis #r2ai
Tutorial on Using r2ai for Binary Cracking
The r2ai tool, integrated with the radare2 framework, aims to simplify binary analysis by mimicking human reasoning and offering automatic error detection, while also encouraging users to be mindful of compatibility and best practices.
decrypt.lol
January 7, 2025 at 11:36 PM
📣 The finalists for the #ACSAC2023 Artifacts Competition and Impact Award have been announced, ranging from #SGX #exploitation, to #cybersecurity #experimentation, to #binaryanalysis and #binary #rewriting 📣 Find more details on the #ACSAC2023 website: www.acsac.org/2023/p...
November 28, 2023 at 3:00 PM