Intelligence Pipeline

13 Phases. 235 Engines. Zero Guesswork.

Most binary analysis tools give you a confidence score and ask you to trust it. We don't. Instead, we show you exactly how every conclusion was reached — step by step, byte by byte.

01

Ingest

Gate
Engines 1–20·Gate: Format Verified

The system opens your file and answers the most basic question: what is this thing? It reads the first few bytes to identify the format. ELF files start with 7F 45 4C 46. PE files start with MZ. Once identified, the engines extract the internal structure: executable code, data, strings, and compiler metadata.

Why it matters

90% of analysts waste their first hour just figuring out what a binary is. B2E does it in 1.2 seconds.

02

Decode

Gate
Engines 21–40·Gate: Architecture Confirmed

Auto-unpacking (Engine 235) and instruction normalization. Machine code is translated into human-readable assembly. Packed or obfuscated binaries are automatically unpacked before decoding.

x86x86-64ARMMIPSPowerPCRISC-V

Why it matters

Without accurate instruction decoding, every subsequent analysis phase would be working with garbage data.

03

Disasm

Gate
Engines 41–60·Gate: Graph Complete

Linear and recursive disassembly maps every decision point — every if/else, every switch statement, every loop. Hidden behavior starts to surface here: functions that only execute on specific dates, code paths that activate on network failures.

Why it matters

Malware authors hide their most dangerous code behind obscure conditions. Disassembly reveals every possible execution path.

04

CFG

Engines 61–80

Builds basic block and control flow graphs. Tracks heap allocations, stack usage, pointer relationships, and buffer boundaries. Finds buffer overflows and use-after-free errors automatically.

Why it matters

Memory corruption vulnerabilities are the most common and most dangerous class of software bugs.

05

DataFlow

Engines 81–100

Taint tracking and semantic validation using Z3. Traces every piece of data from entry to sensitive operation. If user input reaches a format string function without sanitization, this phase flags it.

Why it matters

Most vulnerabilities aren't individual bugs — they're data paths. Unsafe data flowing through functions that never validate it.

06

Decompile

Gate
Engines 101–120·Gate: Behavioral Profile Complete

Translates assembly back into C-like pseudocode with inferred types and meaningful variable names. Replaces var_28h with encryption_key based on usage context.

Why it matters

When the report says "this function encrypts a buffer using AES-256," the decompiled pseudocode lets you verify that claim.

07

Classify

Gate
Engines 121–140·Gate: Enrichment Verified

String, function, and behavior classification. Compares against 8.7 million malware signatures, known CVEs, compiler fingerprints, and API behavior databases. Classifies every function by purpose: cryptographic operations, networking, privilege escalation, anti-analysis techniques.

Why it matters

Your binary doesn't exist in isolation. It exists in the context of every vulnerability ever cataloged.

08

Behavior

Engines 141–160

Environment and API emulation. Binary executed in a sealed sandbox with no network access. Watches runtime behavior: file creation, network attempts, system calls, and memory mutations. Runtime data is correlated with static analysis from all previous phases.

Why it matters

Some behaviors are invisible in static analysis. A binary that unpacks at runtime can only be fully understood by watching it execute.

09

Vuln

Engines 161–180

CWE and CVE detection with capability chain analysis. Cross-references findings against patterns from thousands of binaries to calibrate confidence scores. A finding confirmed by multiple independent techniques gets higher confidence.

Why it matters

Overconfident tools waste time with false positives. Underconfident tools miss real threats.

10

Vector

Engines 229–234

Milvus embedding, search, and cross-binary correlation. Converts analysis artifacts into high-dimensional vectors for semantic similarity search across the entire binary corpus.

Why it matters

Analyzing a binary in isolation misses the bigger picture. Vector search connects it to every binary analyzed before.

11

Narrate

Engines 181–200

PEST narrative compilers (Ν-1 through Ν-master) translate all technical analysis into professional, structured English tailored to 10 distinct analysis profiles. A Malware Analyst report emphasizes kill chains. A Compliance Auditor report emphasizes regulatory controls.

Why it matters

Raw technical data is useless if the person reading it can't act on it.

12

QA

Gate
Engines 201–220·Gate: 240 QA Checks Passed

Invariant Shield plus 8 quality gates verify: evidence references point to real bytes, claims are supported by analysis techniques, confidence scores are consistent, narrative matches underlying data, internal terms are removed. Nothing reaches you without passing all checks.

Why it matters

This is the difference between a tool you use and a tool you trust.

13

Remediate

Optional
Engines 221–228

Boundary resolver, coverage calculation, and DFS scoring. Generates actionable remediation guidance with prioritized fix recommendations based on risk severity and exploitability.

Why it matters

Finding vulnerabilities is only half the job. The other half is knowing what to fix first.

Quality Assurance

The Verification Matrix

Every finding is tracked across four measurement dimensions. These four values always sum to 1.0, ensuring no single aspect can inflate the overall confidence.

01

Technical Precision

How much raw technical detail supports this finding? Every claim is backed by hex offsets and instruction addresses.

Weight0.25
02

Structural Depth

How deeply nested in the program's architecture is this behavior? Measures coverage of functions, branches, and data structures.

Weight0.25
03

Confidence Level

How many independent analysis techniques confirm this finding? Cross-validated across multiple engines.

Weight0.25
04

Temporal Context

When in the program's execution lifecycle does this behavior occur? Maps findings to time-dependent activation.

Weight0.25

No other binary analysis tool on the market gives you this level of mathematical transparency about its own certainty.

What's Hiding in Your Binary?

Right now, compiled software is running on your servers, embedded in your devices, and processing your customers' data. You didn't write it. You can't read the source code. You're trusting it because someone told you to.

235 engines13 phasesFull report in minutes