Libd: Scalable and precise third-party library detection in android markets

M Li, W Wang, P Wang, S Wang, D Wu… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
With the thriving of the mobile app markets, third-party libraries are pervasively integrated in
the Android applications. Third-party libraries provide functionality such as advertisements …

Spain: security patch analysis for binaries towards understanding the pain and pills

Z Xu, B Chen, M Chandramohan… - 2017 IEEE/ACM 39th …, 2017 - ieeexplore.ieee.org
Software vulnerability is one of the major threats to software security. Once discovered,
vulnerabilities are often fixed by applying security patches. In that sense, security patches …

{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking

J Ming, D Xu, Y Jiang, D Wu - 26th USENIX Security Symposium …, 2017 - usenix.org
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …

Identifying open-source license violation and 1-day security risk at large scale

R Duan, A Bijlani, M Xu, T Kim, W Lee - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
With millions of apps available to users, the mobile app market is rapidly becoming very
crowded. Given the intense competition, the time to market is a critical factor for the success …

Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection

L Luo, J Ming, D Wu, P Liu, S Zhu - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …

Binary code clone detection across architectures and compiling configurations

Y Hu, Y Zhang, J Li, D Gu - 2017 IEEE/ACM 25th International …, 2017 - ieeexplore.ieee.org
Binary code clone (or similarity) detection is a fundamental technique for many important
applications, such as plagiarism detection, malware analysis, software vulnerability …

Binsequence: Fast, accurate and scalable binary code reuse detection

H Huang, AM Youssef, M Debbabi - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Code reuse detection is a key technique in reverse engineering. However, existing source
code similarity comparison techniques are not applicable to binary code. Moreover …

Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping

D Xu, J Ming, D Wu - 2017 IEEE Symposium on Security and …, 2017 - ieeexplore.ieee.org
Cryptographic functions have been commonly abused by malware developers to hide
malicious behaviors, disguise destructive payloads, and bypass network-based firewalls …

Testing intermediate representations for binary analysis

S Kim, M Faerevaag, M Jung, S Jung… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Binary lifting, which is to translate a binary executable to a high-level intermediate
representation, is a primary step in binary analysis. Despite its importance, there are only …

In-memory fuzzing for binary code similarity analysis

S Wang, D Wu - … 32nd IEEE/ACM International Conference on …, 2017 - ieeexplore.ieee.org
Detecting similar functions in binary executables serves as a foundation for many binary
code analysis and reuse tasks. By far, recognizing similar components in binary code …