Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 774–786https://doi.org/10.1109/ASE56229.2023.00099Decompilation is a widely used process for reverse engineers to significantly enhance code readability by lifting assembly code to a higher-level C-like language, pseudo-code. Nevertheless, the process of compilation and stripping irreversibly discards ...
- research-articleJune 2022
Binary diffing as a network alignment problem via belief propagation
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 967–978https://doi.org/10.1109/ASE51524.2021.9678782In this paper, we address the problem of finding a correspondence, or matching, between the functions of two programs in binary form, which is one of the most common task in binary diffing. We introduce a new formulation of this problem as a particular ...
- research-articleNovember 2019
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus
SPRO'19: Proceedings of the 3rd ACM Workshop on Software ProtectionPages 15–26https://doi.org/10.1145/3338503.3357720As the underground industry of malware prospers, malware developers consistently attempt to camouflage malicious code and undermine malware detection with various obfuscation schemes. Among them, metamorphism is known to have the potential to defeat the ...
- research-articleJanuary 2013
Feedback-driven binary code diversification
ACM Transactions on Architecture and Code Optimization (TACO), Volume 9, Issue 4Article No.: 24, Pages 1–26https://doi.org/10.1145/2400682.2400683As described in many blog posts and in the scientific literature, exploits for software vulnerabilities are often engineered on the basis of patches. For example, “Microsoft Patch Tuesday” is often followed by “Exploit Wednesday” during which yet ...
- ArticleNovember 2012
iBinHunt: binary hunting with inter-procedural control flow
ICISC'12: Proceedings of the 15th international conference on Information Security and CryptologyPages 92–109https://doi.org/10.1007/978-3-642-37682-5_8Techniques have been proposed to find the semantic differences between two binary programs when the source code is not available. Analyzing control flow, and in particular, intra-procedural control flow, has become an attractive technique in the latest ...
- ArticleApril 2008
SCV: Structure and Constant Value based Binary Diffing
ISA '08: Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)Pages 32–35https://doi.org/10.1109/ISA.2008.29Binary diffing is a method to find differences in similar binary executables such as two different versions of security patches. Diffing methods using flow information detect control flow changes very fast, but they cannot track constant value changes. ...