Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
Scalable, Sound, and Accurate Jump Table Analysis
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 541–552https://doi.org/10.1145/3650212.3680301Jump tables are a common source of indirect jumps in binary code. Resolving these indirect jumps is critical for constructing a complete control-flow graph, which is an essential first step for most applications involving binaries, including binary ...
- research-articleSeptember 2024Distinguished Paper
Multi-modal Learning for WebAssembly Reverse Engineering
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 453–465https://doi.org/10.1145/3650212.3652141The increasing adoption of WebAssembly (Wasm) for performance-critical and security-sensitive tasks drives the demand for WebAssembly program comprehension and reverse engineering. Recent studies have introduced machine learning (ML)-based WebAssembly ...
- research-articleAugust 2024
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning
ACM Transactions on Privacy and Security (TOPS), Volume 27, Issue 3Article No.: 26, Pages 1–37https://doi.org/10.1145/3669901Malware attacks are posing a significant threat to national security, cooperate network, and public endpoint security. Identifying the Advanced Persistent Threat (APT) groups behind the attacks and grouping their activities into attack campaigns help ...
- research-articleJuly 2024
Removal of SAT-Hard Instances in Logic Obfuscation Through Inference of Functionality
ACM Transactions on Design Automation of Electronic Systems (TODAES), Volume 29, Issue 4Article No.: 71, Pages 1–23https://doi.org/10.1145/3674903Logic obfuscation is a prominent approach to protect intellectual property within integrated circuits during fabrication. Many attacks on logic locking have been proposed, particularly in the Boolean satifiability (SAT) attack family, leading to the ...
- research-articleJuly 2024
REPQC: Reverse Engineering and Backdooring Hardware Accelerators for Post-quantum Cryptography
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 533–547https://doi.org/10.1145/3634737.3657016Significant research efforts have been dedicated to designing cryptographic algorithms that are quantum-resistant. The motivation is clear: robust quantum computers, once available, will render current cryptographic standards vulnerable. Thus, we need ...
-
- research-articleJuly 2024
BinAdapter: Leveraging Continual Learning for Inferring Function Symbol Names in a Binary
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 1200–1213https://doi.org/10.1145/3634737.3645006Binary reverse engineering is crucial to gaining insights into the inner workings of a stripped binary. Yet, it is challenging to read the original semantics from a binary code snippet because of the unavailability of high-level information in the source,...
- short-paperJune 2024
Poster: Leveraging Apple's Find My Network for Large-Scale Distributed Sensing
MOBISYS '24: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and ServicesPages 666–667https://doi.org/10.1145/3643832.3661412Find My is a crowd-sourced network of hundreds of millions of Apple devices that use Bluetooth Low Energy (BLE) to detect and track the location of items. We explore the limits and opportunities of using this proprietary network for large-scale ...
- research-articleApril 2024
ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 4Article No.: 96, Pages 1–31https://doi.org/10.1145/3640337Binary code similarity analysis is extremely useful, since it provides rich information about an unknown binary, such as revealing its functionality and identifying reused libraries. Robust binary similarity analysis is challenging, as heavy compiler ...
- research-articleMay 2024
Software Architecture Recovery from Multiple Dependency Models
SAC '24: Proceedings of the 39th ACM/SIGAPP Symposium on Applied ComputingPages 1185–1192https://doi.org/10.1145/3605098.3635917Software architecture recovery tools cluster software modules based on their inter-dependencies to suggest a gross-level decomposition with high modularity. However, there are usually multiple types of dependencies among software modules, each of which ...
- research-articleMarch 2024
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis
Digital Threats: Research and Practice (DTRAP), Volume 5, Issue 1Article No.: 6, Pages 1–25https://doi.org/10.1145/3592623Reverse engineering is the process of understanding the inner working of a software system without having the source code. It is critical for firmware security validation, software vulnerability research, and malware analysis. However, it often requires a ...
- ArticleDecember 2023
A Security Analysis of Password Managers on Android
AbstractPassword Managers are software tools designed to help users easily store and access credentials across devices while also reducing, if not eliminating, reuse of passwords across different service providers. Previous research has identified several ...
Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons
ACSAC '23: Proceedings of the 39th Annual Computer Security Applications ConferencePages 594–608https://doi.org/10.1145/3627106.3627139Reverse engineering is still a largely manual and very time-consuming process. To ease this process, beacons in the form of known instructions or code patterns are commonly used to guide reverse engineers in dissecting a binary. However, if done ...
- short-paperNovember 2023
STraceBERT: Source Code Retrieval using Semantic Application Traces
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 2207–2209https://doi.org/10.1145/3611643.3617852Software reverse engineering is an essential task in software engineering and security, but it can be a challenging process, especially for adversarial artifacts. To address this challenge, we present STraceBERT, a novel approach that utilizes a Java ...
- research-articleNovember 2023
Software Architecture Recovery with Information Fusion
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1535–1547https://doi.org/10.1145/3611643.3616285Understanding the architecture is vital for effectively maintaining and managing large software systems. However, as software systems evolve over time, their architectures inevitably change. To keep up with the change, architects need to track the ...
- short-paperNovember 2023
Modulation to the Rescue: Identifying Sub-Circuitry in the Transistor Morass for Targeted Analysis
ASHES '23: Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware SecurityPages 113–122https://doi.org/10.1145/3605769.3623999Physical attacks form one of the most severe threats against secure computing platforms. Their criticality arises from their corresponding threat model: By, e.g., passively measuring an integrated circuit (IC)'s environment during a security-related ...
- research-articleNovember 2023
Adonis: Practical and Efficient Control Flow Recovery through OS-level Traces
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 33, Issue 1Article No.: 2, Pages 1–27https://doi.org/10.1145/3607187Control flow recovery is critical to promise the software quality, especially for large-scale software in production environment. However, the efficiency of most current control flow recovery techniques is compromised due to their runtime overheads along ...
- research-articleNovember 2023
Lifting Network Protocol Implementation to Precise Format Specification with Security Applications
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 1287–1301https://doi.org/10.1145/3576915.3616614While inferring protocol formats is critical for many security applications, existing techniques often fall short of coverage, inasmuch as almost all of them are in a fashion of dynamic analysis and driven by a limited number of network packets. If a ...
- research-articleNovember 2023
SensorLoader: Bridging the Gap in Cyber-Physical Reverse Engineering Across Embedded Peripheral Devices
SensorsS&P: Proceedings of the First International Workshop on Security and Privacy of Sensing SystemsPages 30–36https://doi.org/10.1145/3628356.3630117Safety-critical cyber-physical systems, such as autonomous vehicles and medical devices, are often driven by notions of state provided by sensor information translated through embedded firmware. This sensor pipeline is often a fragmented supply chain ...
- research-articleSeptember 2024
HexT5: Unified Pre-Training for Stripped Binary Code Information Inference
ASE '23: Proceedings of the 38th IEEE/ACM International Conference on Automated Software EngineeringPages 774–786https://doi.org/10.1109/ASE56229.2023.00099Decompilation is a widely used process for reverse engineers to significantly enhance code readability by lifting assembly code to a higher-level C-like language, pseudo-code. Nevertheless, the process of compilation and stripping irreversibly discards ...
- short-paperOctober 2023
DataDoc Analyzer: A Tool for Analyzing the Documentation of Scientific Datasets
CIKM '23: Proceedings of the 32nd ACM International Conference on Information and Knowledge ManagementPages 5046–5050https://doi.org/10.1145/3583780.3614737Recent public regulatory initiatives and relevant voices in the ML community have identified the need to document datasets according to several dimensions to ensure the fairness and trustworthiness of machine learning systems. In this sense, the data-...