[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.

S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …

Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …

[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)

S Alrabaee, L Wang, M Debbabi - Digital Investigation, 2016 - Elsevier
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …

Cross-architecture binary semantics understanding via similar code comparison

Y Hu, Y Zhang, J Li, D Gu - 2016 IEEE 23rd international …, 2016 - ieeexplore.ieee.org
With the prevailing of smart devices (eg, smart phone, routers, cameras), more and more
programs are ported from traditional desktop platform to embedded hardware with ARM or …

Repackage-proofing android apps

L Luo, Y Fu, D Wu, S Zhu, P Liu - 2016 46th Annual IEEE/IFIP …, 2016 - ieeexplore.ieee.org
App repackaging has become a severe threat to theAndroid ecosystem. While various
protection techniques, such as watermarking and repackaging detection, have been …

Similarity of source code in the presence of pervasive modifications

C Ragkhitwetsagul, J Krinke… - 2016 IEEE 16th …, 2016 - ieeexplore.ieee.org
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from
the problem of pervasive code modifications, ie transformations that may have a global …

Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection

J Ming, F Zhang, D Wu, P Liu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Software plagiarism, an act of illegally copying others' code, has become a serious concern
for honest software companies and the open source community. Considerable research …

Translingual obfuscation

P Wang, S Wang, J Ming, Y Jiang… - 2016 IEEE European …, 2016 - ieeexplore.ieee.org
Program obfuscation is an important software protection technique that prevents attackers
from revealing the programming logic and design of the software. We introduce translingual …

Solminer: mining distinct solutions in programs

L Luo, Q Zeng - Proceedings of the 38th International Conference on …, 2016 - dl.acm.org
Given a programming problem, because of a variety of data structures and algorithms that
can be applied and different tradeoffs, such as space-time, to be considered, there may be …

Software ingredients: Detection of third-party component reuse in java software release

T Ishio, RG Kula, T Kanda, DM German… - Proceedings of the 13th …, 2016 - dl.acm.org
A software product is often dependent on a large number of third-party components. To
assess potential risks, such as security vulnerabilities and license violations, a list of …