[PDF][PDF] REDQUEEN: Fuzzing with Input-to-State Correspondence.

C Aschermann, S Schumilo, T Blazytko, R Gawlik… - NDSS, 2019 - nyx-fuzz.com
Automated software testing based on fuzzing has experienced a revival in recent years.
Especially feedback-driven fuzzing has become well-known for its ability to efficiently …

Binary rewriting without control flow recovery

GJ Duck, X Gao, A Roychoudhury - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Static binary rewriting has many important applications in software security and systems,
such as hardening, repair, patching, instrumentation, and debugging. While many different …

Odin: on-demand instrumentation with on-the-fly recompilation

M Wang, J Liang, C Zhou, Z Wu, X Xu… - Proceedings of the 43rd …, 2022 - dl.acm.org
Instrumentation is vital to fuzzing. It provides fuzzing directions and helps detect covert bugs,
yet its overhead greatly reduces the fuzzing throughput. To reduce the overhead, compilers …

Cipherfix: Mitigating Ciphertext {Side-Channel} Attacks in Software

J Wichelmann, A Pätschke, L Wilke… - 32nd USENIX Security …, 2023 - usenix.org
Trusted execution environments (TEEs) provide an environment for running workloads in the
cloud without having to trust cloud service providers, by offering additional hardware …

zpoline: a system call hook mechanism based on binary rewriting

K Yasukata, H Tazaki, PL Aublin… - 2023 USENIX Annual …, 2023 - usenix.org
This paper presents zpoline, a system call hook mechanism for x86-64 CPUs. zpoline
employs binary rewriting and offers seven advantages: 1) low hook overhead, 2) exhaustive …

Hardening binaries against more memory errors

GJ Duck, Y Zhang, RHC Yap - Proceedings of the Seventeenth …, 2022 - dl.acm.org
Memory errors, such as buffer overflows and use-after-free, remain the root cause of many
security vulnerabilities in modern software. The use of closed source software further …

[PDF][PDF] Introduction to Procedural Debugging through Binary Libification

J Brossard - USENIX Workshop On Offensive Technologies (WOOT …, 2024 - usenix.org
Modify the ELF type from ET_EXEC to ET_DYN in the ELF header. typedef struct elf64_shdr
{Elf64_Word sh_name;/* Section name, index in string tbl*/Elf64_Word sh_type; …

SaBRe: load-time selective binary rewriting

PA Arras, A Andronidis, L Pina, K Mituzas… - International Journal on …, 2022 - Springer
Binary rewriting consists in disassembling a program to modify its instructions. However,
existing solutions suffer from shortcomings in terms of soundness and performance. We …

Honey, I shrunk the ELFs: Lightweight binary tailoring of shared libraries

A Ziegler, J Geus, B Heinloth, T Hönig… - ACM Transactions on …, 2019 - dl.acm.org
In the embedded domain, industrial sectors (ie, automotive industry, avionics) are
undergoing radical changes. They broadly adopt commodity hardware and move away from …

Scalable fuzzing of program binaries with E9AFL

X Gao, GJ Duck… - 2021 36th IEEE/ACM …, 2021 - ieeexplore.ieee.org
Greybox fuzzing is an effective method for software testing. Greybox fuzzers, such as AFL,
use instrumentation that collects path coverage information in order to guide the fuzzing …