[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.
S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …
Being able to perform this process at the binary level is very important given that many …
Bingo: Cross-architecture cross-os binary search
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …
vulnerable software components. However, our survey of the literature shows that most …
Cross-architecture binary semantics understanding via similar code comparison
With the prevailing of smart devices (eg, smart phone, routers, cameras), more and more
programs are ported from traditional desktop platform to embedded hardware with ARM or …
programs are ported from traditional desktop platform to embedded hardware with ARM or …
Repackage-proofing android apps
App repackaging has become a severe threat to theAndroid ecosystem. While various
protection techniques, such as watermarking and repackaging detection, have been …
protection techniques, such as watermarking and repackaging detection, have been …
Similarity of source code in the presence of pervasive modifications
C Ragkhitwetsagul, J Krinke… - 2016 IEEE 16th …, 2016 - ieeexplore.ieee.org
Source code analysis to detect code cloning, code plagiarism, and code reuse suffers from
the problem of pervasive code modifications, ie transformations that may have a global …
the problem of pervasive code modifications, ie transformations that may have a global …
Deviation-based obfuscation-resilient program equivalence checking with application to software plagiarism detection
Software plagiarism, an act of illegally copying others' code, has become a serious concern
for honest software companies and the open source community. Considerable research …
for honest software companies and the open source community. Considerable research …
Translingual obfuscation
Program obfuscation is an important software protection technique that prevents attackers
from revealing the programming logic and design of the software. We introduce translingual …
from revealing the programming logic and design of the software. We introduce translingual …
Solminer: mining distinct solutions in programs
Given a programming problem, because of a variety of data structures and algorithms that
can be applied and different tradeoffs, such as space-time, to be considered, there may be …
can be applied and different tradeoffs, such as space-time, to be considered, there may be …
Software ingredients: Detection of third-party component reuse in java software release
A software product is often dependent on a large number of third-party components. To
assess potential risks, such as security vulnerabilities and license violations, a list of …
assess potential risks, such as security vulnerabilities and license violations, a list of …