Libd: Scalable and precise third-party library detection in android markets
With the thriving of the mobile app markets, third-party libraries are pervasively integrated in
the Android applications. Third-party libraries provide functionality such as advertisements …
the Android applications. Third-party libraries provide functionality such as advertisements …
Spain: security patch analysis for binaries towards understanding the pain and pills
Software vulnerability is one of the major threats to software security. Once discovered,
vulnerabilities are often fixed by applying security patches. In that sense, security patches …
vulnerabilities are often fixed by applying security patches. In that sense, security patches …
{BinSim}: Trace-based semantic binary diffing via system call sliced segment equivalence checking
Detecting differences between two binary executables (binary diffing), first derived from
patch analysis, have been widely employed in various software security analysis tasks, such …
patch analysis, have been widely employed in various software security analysis tasks, such …
Identifying open-source license violation and 1-day security risk at large scale
With millions of apps available to users, the mobile app market is rapidly becoming very
crowded. Given the intense competition, the time to market is a critical factor for the success …
crowded. Given the intense competition, the time to market is a critical factor for the success …
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software and algorithm plagiarism detection
Existing code similarity comparison methods, whether source or binary code based, are
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …
mostly not resilient to obfuscations. Identifying similar or identical code fragments among …
Binary code clone detection across architectures and compiling configurations
Binary code clone (or similarity) detection is a fundamental technique for many important
applications, such as plagiarism detection, malware analysis, software vulnerability …
applications, such as plagiarism detection, malware analysis, software vulnerability …
Binsequence: Fast, accurate and scalable binary code reuse detection
H Huang, AM Youssef, M Debbabi - Proceedings of the 2017 ACM on …, 2017 - dl.acm.org
Code reuse detection is a key technique in reverse engineering. However, existing source
code similarity comparison techniques are not applicable to binary code. Moreover …
code similarity comparison techniques are not applicable to binary code. Moreover …
Cryptographic function detection in obfuscated binaries via bit-precise symbolic loop mapping
Cryptographic functions have been commonly abused by malware developers to hide
malicious behaviors, disguise destructive payloads, and bypass network-based firewalls …
malicious behaviors, disguise destructive payloads, and bypass network-based firewalls …
Testing intermediate representations for binary analysis
S Kim, M Faerevaag, M Jung, S Jung… - 2017 32nd IEEE …, 2017 - ieeexplore.ieee.org
Binary lifting, which is to translate a binary executable to a high-level intermediate
representation, is a primary step in binary analysis. Despite its importance, there are only …
representation, is a primary step in binary analysis. Despite its importance, there are only …
In-memory fuzzing for binary code similarity analysis
Detecting similar functions in binary executables serves as a foundation for many binary
code analysis and reuse tasks. By far, recognizing similar components in binary code …
code analysis and reuse tasks. By far, recognizing similar components in binary code …