AI, cybersecurity, and software supply chain insights from our research team.
AI, cybersecurity, and software supply chain insights from our research team.
The most fundamental failure mode of LLM-powered binary analysis: models evaluate binaries by their most obvious features and stop there. This post walks through how Dr. Binary addresses it with an exhaustive analysis tool that processes every function before the LLM draws any conclusions.
Agentic Binary Analysis: When AI Becomes the Analyst
DeepDiff: Next-Generation Binary Diffing for Precise Vulnerability and Patch Detection
In-Depth Review: How Accurate Are Today’s SBOM Tools
Unveiling Third-Party Libraries (and Their Vulnerabilities) in Closed-Source Applications
SBOM FAQ
How Deepbits Fulfills the Latest FDA Cybersecurity Guidelines for Medical Devices
How Binary Code AI Changes Malware Defenses?
Building SBOMs for COTS Android Apps
How Do You Upgrade OpenSSL in Your Software Stack? — SBOM and OBOM assisted software upgrade
Discovering Known Vulnerabilities in IoT Devices via Code Search
A Fast and Accurate Disassembler based on Deep Learning
Searching Statically Linked Vulnerable Functions in Minutes
Searching Vulnerabilities in Binaries
A Comparative Review of Embedding based Binary Code Search Techniques