Original text by Adam Bromiley
Introduction
I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, #BinaryAnalysis #Potatosecurity
core-jmp.org/2026/03/tami...
Original text by Adam Bromiley
Introduction
I stumbled into infosec the same year the NSA graced us with Ghidra. It’s by far become the most used tool in my arsenal for reverse engineering and vulnerability research. It’s free, #BinaryAnalysis #Cybersecurity
core-jmp.org/2026/03/tami...
Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries"
Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (www.acsac.org/2024/p...) 5/6
#Cybersecurity #BinaryAnalysis
AGNOMIN Introduces Architecture‑Agnostic Multi‑Label Function Naming
AGNOMIN improved precision by up to 27.17% and recall by up to 55.86% on 9,000 ELF binaries across three architectures, and added a 5.89% recall gain on unseen architectures. Read more: getnews.me/agnomin-introduces-archi... #agnomin #binaryanalysis
ContraBin: Contrastive Learning Boosts Binary Code Analysis
ContraBin, a learning framework, embeds source code, comments and binary fragments. Synthetic comments improve embedding quality, while human comments may reduce performance. Read more: getnews.me/contrabin-contrastive-le... #contrabin #binaryanalysis
fwiw,
#Akai #MPD218 Preset File Format (.mpd218)
akai-mpd218_preset_file_format.md
gist.github.com/mxmilkiib/018f4a55a529640427a29f143a3978d3
generated by Claude Sonnet + GPT-5 (high reasoning)
#midi #controller #sysex #controllerism #fileformat #binaryanalysis #djing #creativecoding
Cover image for the open access article “Lost in Translation: How Intermediate Language Representations Affect Malware Classification” published in AI, Computer Science and Robotics Technology journal. Authors: Logan Cannan and Tommy Morris.
In this #OpenAccess article, methods of translating malicious code (#Microcode, #PCode, #LLIL) were tested to see their impact on #malware detection, showing how choices affect accuracy, #data needs, and model performance.
Read: bit.ly/4glKiLs
#MachineLearning #BinaryAnalysis #OpenScience #ACRT
Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries.
In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface.
#IoT
Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork.
In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis.
Visibility matters.
Still relying on outdated security tools?
👎 No binary scanning
🕳️ Incomplete #SBOMs
📉 Missed vulnerabilities
Here are 6 signs it's time to upgrade & what to look for 👉 finitestate.io/blog/when-to...
#ProductSecurity #IoTSecurity #SBOM #BinaryAnalysis #DevSecOps #SCA #SAST
Why do so many vulnerabilities slip past traditional scanning tools?
In our latest blog, we explore the blind spots in traditional SCA/SAST & how Finite State helps teams uncover what others miss 👉https://t.co/R9giOUBz2E
#IoTSecurity #ProductSecurity #BinaryAnalysis #SCA #SAST
DWARF also enables symbolicated backtraces and setting line-level breakpoints, making complex binary analysis much clearer in GDB. #BinaryAnalysis 3/6
Nyxelf: A Linux ELF tool for analyzing malicious Linux ELF binaries that supports static and dynamic analysis
🔗Check it out:
github.com/M3rcuryLake/...
#binaryanalysis #linuxelf #reverseengineering #malwareanalysis #threathunting #infosec
Legacy security testing leaves mobile apps vulnerable to third-party risks. Without deeper binary analysis, attackers can exploit blind spots in the software supply chain. jpmellojr.blogspot.com/2025/05/mobi... #AppSec #MobileSecurity #BinaryAnalysis #SecurityTesting
Changes to the CVE program signal a critical moment for AppSec strategies. It's time to modernize your approach to risk management. jpmellojr.blogspot.com/2025/04/chan... #CVE #NVD #AppSec #BinaryAnalysis #RiskManagement #SoftwareSecurity
#News: CodeSecure and FOSSA Partner to Deliver Single Integrated Platform for Binary and Open Source Analysis:
www.businesswire.com/news/home/20...
#BinaryAnalysis #SBOM #SoftwareSupplyChain #DevSecOps #AppSec #OpenSource #Security #BCA #Compliance #ThirdPartyRisk
Introducing Nova (ICLR’25), foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. Preprint: arxiv.org/pdf/2311.13721
#LLM4Code #LLM #BinaryAnalysis #Security
@cerias.bsky.social @iclr-conf.bsky.social
Unlock binary cracking with the r2ai tool in the radare2 framework. It enhances analysis by simulating human reasoning and automatically detecting errors. Stay aware of compatibility issues and best practices for optimal results. #cybersecurity #threat #binaryanalysis #r2ai