Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2024
Scheduled Execution-Based Binary Indirect Call Targets Refinement
AbstractInferring binary indirect call targets is challenging due to dynamic generation and lack of symbol information in stripped binaries. Although type analysis and points-to analysis methods aid the inference, existing methods still yield high false ...
- research-articleJuly 2024
A tool for IoT Firmware Certification
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 59, Pages 1–7https://doi.org/10.1145/3664476.3670469The rapid growth of the Internet of Things (IoT) has created a fragmented ecosystem, with no clear rules for security and reliability. This lack of standardization makes IoT devices vulnerable to attacks. IoT firmware certification can address these ...
- research-articleJuly 2024
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
International Journal of Information Security (IJOIS), Volume 23, Issue 5Pages 3135–3151https://doi.org/10.1007/s10207-024-00882-4AbstractSoftware can be vulnerable to various types of interference. The production of cyber threat intelligence for closed source software requires significant effort, experience, and many manual steps. The objective of this study is to automate the ...
- research-articleMay 2023
Neural-FEBI: Accurate function identification in Ethereum Virtual Machine bytecode
Journal of Systems and Software (JSSO), Volume 199, Issue Chttps://doi.org/10.1016/j.jss.2023.111627AbstractMillions of smart contracts have been deployed onto the Ethereum platform, posing potential attack subjects. Therefore, analyzing contract binaries is vital since their sources are unavailable, involving identification comprising ...
Highlights- A neural network-based approach to identify function entries in EVM bytecode.
- A ...
- research-articleJanuary 2023
Static vulnerability mining of IoT devices based on control flow graph construction and graph embedding network
Computer Communications (COMS), Volume 197, Issue CPages 267–275https://doi.org/10.1016/j.comcom.2022.10.021AbstractAutomatic static vulnerability analysis for IoT devices is always an important and challenging research problem. Traditional vulnerability finding methods are primarily based on manually built structures, which have limitations in accuracy and ...
-
- ArticleJanuary 2023
Obfuscation-Resilient Semantic Functionality Identification Through Program Simulation
- Sebastian Schrittwieser,
- Patrick Kochberger,
- Michael Pucher,
- Caroline Lawitschka,
- Philip König,
- Edgar R. Weippl
AbstractFiguring out whether a particular semantic functionality exists in a binary program is challenging. While pattern-matching-based detection is susceptible to syntactic changes of the code, formal equivalence proofs quickly hit complexity ...
- research-articleSeptember 2022
Update with care: Testing candidate bug fixes and integrating selective updates through binary rewriting
Journal of Systems and Software (JSSO), Volume 191, Issue Chttps://doi.org/10.1016/j.jss.2022.111381AbstractEnterprise software updates depend on the interaction between user and developer organizations. This interaction becomes especially complex when a single developer organization writes software that services hundreds of different user ...
Highlights- Generates test cases from record–replay execution trace.
- Tests candidate fixes ...
- research-articleAugust 2022
Apícula: Static detection of API calls in generic streams of bytes
- Mario D’Onghia,
- Matteo Salvadore,
- Benedetto Maria Nespoli,
- Michele Carminati,
- Mario Polino,
- Stefano Zanero
AbstractAPI functions often require the crafting of specific inputs and may return some output that is usually processed by the code that immediately follows their invocation. In this work, we claim that - for some APIs - those two stages are ...
Improving cross-platform binary analysis using representation learning via graph alignment
ISSTA 2022: Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 151–163https://doi.org/10.1145/3533767.3534383Cross-platform binary analysis requires a common representation of binaries across platforms, on which a specific analysis can be performed. Recent work proposed to learn low-dimensional, numeric vector representations (i.e., embeddings) of disassembled ...
- research-articleJanuary 2022
Protocol Reverse-Engineering Methods and Tools: A Survey
Computer Communications (COMS), Volume 182, Issue CPages 238–254https://doi.org/10.1016/j.comcom.2021.11.009AbstractThe widespread utilization of network protocols raises many security and privacy concerns. To address them, protocol reverse-engineering (PRE) has been broadly applied in diverse domains, such as network management, security validation, and ...
- ArticleOctober 2020
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables
AbstractImplementation flaws in cryptographic libraries, design flaws in underlying cryptographic primitives, and weaknesses in protocols using both, can all lead to exploitable vulnerabilities in software. Manually fixing such issues is challenging and ...
- ArticleSeptember 2020
Hoare-Style Logic for Unstructured Programs
AbstractEnabling Hoare-style reasoning for low-level code is attractive since it opens the way to regain structure and modularity in a domain where structure is essentially absent. The field, however, has not yet arrived at a fully satisfactory solution, ...
- ArticleJuly 2019
Creating a User-Centric Data Flow Visualization: A Case Study
- Karin Butler,
- Michelle Leger,
- Denis Bueno,
- Christopher Cuellar,
- Michael J. Haass,
- Timothy Loffredo,
- Geoffrey Reedy,
- Julian Tuminaro
Human Interface and the Management of Information. Visual Information and Knowledge ManagementPages 174–193https://doi.org/10.1007/978-3-030-22660-2_12AbstractVulnerability analysts protecting software lack adequate tools for understanding data flow in binaries. We present a case study in which we used human factors methods to develop a taxonomy for understanding data flow and the visual representations ...
- research-articleApril 2019
TrABin: Trustworthy analyses of binaries
Science of Computer Programming (SCPR), Volume 174, Issue CPages 72–89https://doi.org/10.1016/j.scico.2019.01.001AbstractVerification of microkernels, device drivers, and crypto routines requires analyses at the binary level. In order to automate these analyses, in the last years several binary analysis platforms have been introduced. These platforms ...
Highlights- Certifying analysis tools can be developed for modern computer architectures.
- ...
- research-articleApril 2019
Towards exact and inexact approximate matching of executable binaries
Digital Investigation: The International Journal of Digital Forensics & Incident Response (DIGITI), Volume 28, Issue SPages S12–S21https://doi.org/10.1016/j.diin.2019.01.027AbstractThe application of approximate matching (a.k.a. fuzzy hashing or similarity hashing) is often considered in the field of malware or binary analysis. Recent research showed major weaknesses of predominant fuzzy hashing techniques in the ...
- surveyJuly 2018
Who Watches the Watchmen: A Security-focused Review on Current State-of-the-art Techniques, Tools, and Methods for Systems and Binary Analysis on Modern Platforms
ACM Computing Surveys (CSUR), Volume 51, Issue 4Article No.: 69, Pages 1–34https://doi.org/10.1145/3199673Malicious software, a threat users face on a daily basis, have evolved from simple bankers based on social engineering to advanced persistent threats. Recent research and discoveries reveal that malware developers have been using a wide range of anti-...
- research-articleJune 2018
Clone-hunter: accelerated bound checks elimination via binary code clone detection
MAPL 2018: Proceedings of the 2nd ACM SIGPLAN International Workshop on Machine Learning and Programming LanguagesPages 11–19https://doi.org/10.1145/3211346.3211347Unsafe pointer usage and illegitimate memory accesses are prevalent bugs in software. To ensure memory safety, conditions for array bound checks are inserted into the code to detect out-of-bound memory accesses. Unfortunately, these bound checks ...
- research-articleAugust 2017
The x86/64 Binary Code to Smart Intermediate Language Translation for Software Weakness
ICAIP '17: Proceedings of the International Conference on Advances in Image ProcessingPages 129–134https://doi.org/10.1145/3133264.3133295Today, the proportion of software in society as a whole is steadily increasing. In addition to size of software increasing, the number of cases dealing with personal information is also increasing. This shows the importance of weekly software security ...
- ArticleNovember 2016
A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems
AbstractNowadays, embedded systems have been widely deployed in numerous applications. Firmwares in embedded systems are typically custom-built to provide a set of very specialized functionalities. They are prone to taint-style vulnerability with a high ...
- research-articleJune 2016
Verifying bit-manipulations of floating-point
PLDI '16: Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and ImplementationPages 70–84https://doi.org/10.1145/2908080.2908107Reasoning about floating-point is difficult and becomes only more so if there is an interplay between floating-point and bit-level operations. Even though real-world floating-point libraries use implementations that have such mixed computations, no ...
Also Published in:
ACM SIGPLAN Notices: Volume 51 Issue 6