📝 Tech Blog

Deepbits

Deep Thinking

AI, cybersecurity, and software supply chain insights from our research team.

How We Built Dr. Binary, Part 1: Beating the Superficial-Features Trap

The most fundamental failure mode of LLM-powered binary analysis: models evaluate binaries by their most obvious features and stop there. This post walks through how Dr. Binary addresses it with an exhaustive analysis tool that processes every function before the LLM draws any conclusions.

Featured post icon

Agentic Binary Analysis: When AI Becomes the Analyst

DeepDiff: Next-Generation Binary Diffing for Precise Vulnerability and Patch Detection

In-Depth Review: How Accurate Are Today’s SBOM Tools

Unveiling Third-Party Libraries (and Their Vulnerabilities) in Closed-Source Applications

SBOM FAQ

How Deepbits Fulfills the Latest FDA Cybersecurity Guidelines for Medical Devices

How Binary Code AI Changes Malware Defenses?

Building SBOMs for COTS Android Apps

How Do You Upgrade OpenSSL in Your Software Stack? — SBOM and OBOM assisted software upgrade

Discovering Known Vulnerabilities in IoT Devices via Code Search

A Fast and Accurate Disassembler based on Deep Learning

Searching Statically Linked Vulnerable Functions in Minutes

Searching Vulnerabilities in Binaries

A Comparative Review of Embedding based Binary Code Search Techniques