Trending

#BinaryAnalysis

Latest posts tagged with #BinaryAnalysis on Bluesky

Latest Top
Trending

Posts tagged #BinaryAnalysis

Original text by Adam Bromiley


Introduction  


I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, #BinaryAnalysis #Potatosecurity
core-jmp.org/2026/03/tami...

1 0 0 0
Preview
Taming the dragon: reverse engineering firmware with Ghidra  The article explains how to reverse engineer embedded firmware using Ghidra, covering techniques for loading firmware, identifying CPU architectures, analyzing functions, and using scripts/plugins to understand device logic and discover vulnerabilities.

Original text by Adam Bromiley


Introduction  


I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, #BinaryAnalysis #Cybersecurity
core-jmp.org/2026/03/tami...

0 0 0 0
Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries"

Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries"

Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (www.acsac.org/2024/p...) 5/6
#Cybersecurity #BinaryAnalysis

0 0 1 0
AGNOMIN Introduces Architecture‑Agnostic Multi‑Label Function Naming

AGNOMIN Introduces Architecture‑Agnostic Multi‑Label Function Naming

AGNOMIN improved precision by up to 27.17% and recall by up to 55.86% on 9,000 ELF binaries across three architectures, and added a 5.89% recall gain on unseen architectures. Read more: getnews.me/agnomin-introduces-archi... #agnomin #binaryanalysis

0 0 0 0
ContraBin: Contrastive Learning Boosts Binary Code Analysis

ContraBin: Contrastive Learning Boosts Binary Code Analysis

ContraBin, a learning framework, embeds source code, comments and binary fragments. Synthetic comments improve embedding quality, while human comments may reduce performance. Read more: getnews.me/contrabin-contrastive-le... #contrabin #binaryanalysis

0 0 0 0
Preview
Akai MPD218 Preset File Format (.mpd218) Akai MPD218 Preset File Format (.mpd218). GitHub Gist: instantly share code, notes, and snippets.

fwiw,

#Akai #MPD218 Preset File Format (.mpd218)

akai-mpd218_preset_file_format.md

gist.github.com/mxmilkiib/018f4a55a529640427a29f143a3978d3

generated by Claude Sonnet + GPT-5 (high reasoning)

#midi #controller #sysex #controllerism #fileformat #binaryanalysis #djing #creativecoding

1 1 1 0
Cover image for the open access article “Lost in Translation: How Intermediate Language Representations Affect Malware Classification” published in AI, Computer Science and Robotics Technology journal. Authors: Logan Cannan and Tommy Morris.

Cover image for the open access article “Lost in Translation: How Intermediate Language Representations Affect Malware Classification” published in AI, Computer Science and Robotics Technology journal. Authors: Logan Cannan and Tommy Morris.

In this #OpenAccess article, methods of translating malicious code (#Microcode, #PCode, #LLIL) were tested to see their impact on #malware detection, showing how choices affect accuracy, #data needs, and model performance.

Read: bit.ly/4glKiLs
#MachineLearning #BinaryAnalysis #OpenScience #ACRT

1 0 0 0
Video

Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries.

In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface.

#IoT

0 0 0 0
Video

Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork.

In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis.

Visibility matters.

0 0 0 0
Preview
5 Signs Your Product Security Program Has Outgrown Its Current Tools Your product security stack shouldn’t hold you back. Here are 5 signs it's time to scale beyond homegrown tools and manual SBOMs.

Still relying on outdated security tools?

👎 No binary scanning
🕳️ Incomplete #SBOMs
📉 Missed vulnerabilities

Here are 6 signs it's time to upgrade & what to look for 👉 finitestate.io/blog/when-to...

#ProductSecurity #IoTSecurity #SBOM #BinaryAnalysis #DevSecOps #SCA #SAST

0 0 0 0
Preview
Risks of Incomplete Security Scanning Across IoT Product Lifecycles Incomplete scan coverage leaves critical IoT vulnerabilities hidden. Learn how to close DevSecOps gaps and meet global security regulations.

Why do so many vulnerabilities slip past traditional scanning tools?

In our latest blog, we explore the blind spots in traditional SCA/SAST & how Finite State helps teams uncover what others miss 👉https://t.co/R9giOUBz2E

#IoTSecurity #ProductSecurity #BinaryAnalysis #SCA #SAST

0 0 0 0

DWARF also enables symbolicated backtraces and setting line-level breakpoints, making complex binary analysis much clearer in GDB. #BinaryAnalysis 3/6

0 0 1 0
Preview
GitHub - M3rcuryLake/Nyxelf: Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and dynamic analysis techniques. Nyxelf is a highly effective tool tailored for analyzing malicious Linux ELF binaries, offering comprehensive support for both static and dynamic analysis techniques. - M3rcuryLake/Nyxelf

Nyxelf: A Linux ELF tool for analyzing malicious Linux ELF binaries that supports static and dynamic analysis

🔗Check it out:
github.com/M3rcuryLake/...

#binaryanalysis #linuxelf #reverseengineering #malwareanalysis #threathunting #infosec

5 1 0 0
Preview
Mobile and third-party risk: How legacy testing leaves you exposed Risks to software supply chains from mobile applications are increasing, largely due to a lack of deep visibility into the software's codeb...

Legacy security testing leaves mobile apps vulnerable to third-party risks. Without deeper binary analysis, attackers can exploit blind spots in the software supply chain. jpmellojr.blogspot.com/2025/05/mobi... #AppSec #MobileSecurity #BinaryAnalysis #SecurityTesting

0 0 0 0
Preview
Changes to CVE program are a call to action on your AppSec strategy For the countless organizations that have relied on CVEs and the National Vulnerability Database to support vulnerability management and c...

Changes to the CVE program signal a critical moment for AppSec strategies. It's time to modernize your approach to risk management. jpmellojr.blogspot.com/2025/04/chan... #CVE #NVD #AppSec #BinaryAnalysis #RiskManagement #SoftwareSecurity

0 0 0 0
Preview
CodeSecure and FOSSA Partner to Deliver Single Integrated Platform for Binary and Open Source Analysis Together CodeSentry-FOSSA allows customers to generate comprehensive SBOMs that trace both open source and binaries contained in their software.

#News: CodeSecure and FOSSA Partner to Deliver Single Integrated Platform for Binary and Open Source Analysis:
www.businesswire.com/news/home/20...

#BinaryAnalysis #SBOM #SoftwareSupplyChain #DevSecOps #AppSec #OpenSource #Security #BCA #Compliance #ThirdPartyRisk

1 0 0 0
Post image Post image Post image

Introducing Nova (ICLR’25), foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. Preprint: arxiv.org/pdf/2311.13721

#LLM4Code #LLM #BinaryAnalysis #Security

@cerias.bsky.social @iclr-conf.bsky.social

6 2 5 0
Preview
Tutorial on Using r2ai for Binary Cracking The r2ai tool, integrated with the radare2 framework, aims to simplify binary analysis by mimicking human reasoning and offering automatic error detection, while also encouraging users to be mindful of compatibility and best practices.

Unlock binary cracking with the r2ai tool in the radare2 framework. It enhances analysis by simulating human reasoning and automatically detecting errors. Stay aware of compatibility issues and best practices for optimal results. #cybersecurity #threat #binaryanalysis #r2ai

0 1 0 0