A Review of IoT Firmware Vulnerabilities and Auditing Techniques

T Bakhshi, B Ghita, I Kuzminykh - Sensors, 2024 - mdpi.com
In recent years, the Internet of Things (IoT) paradigm has been widely applied across a
variety of industrial and consumer areas to facilitate greater automation and increase …

LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs' Vulnerability Reasoning

Y Sun, D Wu, Y Xue, H Liu, W Ma, L Zhang… - arXiv preprint arXiv …, 2024 - arxiv.org
Large language models (LLMs) have demonstrated significant poten-tial for many
downstream tasks, including those requiring human-level intelligence, such as vulnerability …

Android malware detection method based on graph attention networks and deep fusion of multimodal features

S Chen, B Lang, H Liu, Y Chen, Y Song - Expert Systems with Applications, 2024 - Elsevier
Currently, Android malware detection methods always focus on one kind of app feature,
such as structural, semantic, or other statistical features. This paper proposes a novel …

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey

VE Moghadam, G Serra, F Aromolo, G Buttazzo… - IEEE …, 2024 - ieeexplore.ieee.org
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …

[PDF][PDF] Ahoy sailr! there is no need to dream of c: A compiler-aware structuring algorithm for binary decompilation

ZL Basque, AP Bajaj, W Gibbs, J O'Kain… - Proceedings of the …, 2024 - usenix.org
Contrary to prevailing wisdom, we argue that the measure of binary decompiler success is
not to eliminate all gotos or reduce the complexity of the decompiled code but to get as close …

Contrastive graph similarity networks

L Wang, Y Zheng, D Jin, F Li, Y Qiao… - ACM Transactions on the …, 2024 - dl.acm.org
Graph similarity learning is a significant and fundamental issue in the theory and analysis of
graphs, which has been applied in a variety of fields, including object tracking …

GraphMoCo: A graph momentum contrast model for large-scale binary function representation learning

R Sun, S Guo, J Guo, W Li, X Zhang, X Guo, Z Pan - Neurocomputing, 2024 - Elsevier
In the field of cybersecurity, the ability to compute similarity scores at the function level for
binary code is of utmost importance. Considering that a single binary file may contain an …

[PDF][PDF] SyzBridge: Bridging the Gap in Exploitability Assessment of Linux Kernel Bugs in the Linux Ecosystem

X Zou, Y Hao, Z Zhang, J Pu, W Chen… - 31st Annual Network …, 2024 - zhyfeng.github.io
Continuous fuzzing has become an integral part of the Linux kernel ecosystem, discovering
thousands of bugs over the past few years. Interestingly, only a tiny fraction of them were …

EMBERSim: a large-scale databank for boosting similarity search in malware analysis

DG Corlatescu, A Dinu, MP Gaman… - Advances in Neural …, 2024 - proceedings.neurips.cc
In recent years there has been a shift from heuristics based malware detection towards
machine learning, which proves to be more robust in the current heavily adversarial threat …

ToolPhet: Inference of Compiler Provenance From Stripped Binaries With Emerging Compilation Toolchains

H Jang, N Murodova, H Koo - IEEE Access, 2024 - ieeexplore.ieee.org
Identifying compiler toolchain provenance serves as a basis for both benign and malicious
binary analyses. A wealth of prior studies mostly focuses on the inference of a popular …