A survey of binary code similarity

IU Haq, J Caballero - Acm computing surveys (csur), 2021 - dl.acm.org
Binary code similarityapproaches compare two or more pieces of binary code to identify their
similarities and differences. The ability to compare binary code enables many real-world …

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security

H Xu, Y Zhou, J Ming, M Lyu - Cybersecurity, 2020 - Springer
Software obfuscation has been developed for over 30 years. A problem always confusing
the communities is what security strength the technique can achieve. Nowadays, this …

Opening the blackbox of virustotal: Analyzing online phishing scan engines

P Peng, L Yang, L Song, G Wang - Proceedings of the Internet …, 2019 - dl.acm.org
Online scan engines such as VirusTotal are heavily used by researchers to label malicious
URLs and files. Unfortunately, it is not well understood how the labels are generated and …

Unleashing the hidden power of compiler optimization on binary code difference: An empirical study

X Ren, M Ho, J Ming, Y Lei, L Li - Proceedings of the 42nd ACM …, 2021 - dl.acm.org
Hunting binary code difference without source code (ie, binary diffing) has compelling
applications in software security. Due to the high variability of binary code, existing solutions …

Jshrink: In-depth investigation into debloating modern java applications

BR Bruce, T Zhang, J Arora, GH Xu, M Kim - Proceedings of the 28th …, 2020 - dl.acm.org
Modern software is bloated. Demand for new functionality has led developers to include
more and more features, many of which become unneeded or unused as software evolves …

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning

D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu - Computer Networks, 2021 - Elsevier
With the development of cloud computing, more and more enterprises and institutes have
deployed important computing tasks and data into virtualization environments. Virtualization …

Loki: Hardening code obfuscation against automated attacks

M Schloegel, T Blazytko, M Contag… - 31st USENIX Security …, 2022 - usenix.org
Software obfuscation is a crucial technology to protect intellectual property and manage
digital rights within our society. Despite its huge practical importance, both commercial and …

MDGraph: A novel malware detection method based on memory dump and graph neural network

Q Li, B Zhang, D Tian, X Jia, C Hu - Expert Systems with Applications, 2024 - Elsevier
Malware detection is of great importance to computer security. Although the malware
detection approaches have made great progress in recent years, these methods are still …

{MBA-Blast}: Unveiling and Simplifying Mixed {Boolean-Arithmetic} Obfuscation

B Liu, J Shen, J Ming, Q Zheng, J Li, D Xu - 30th USENIX Security …, 2021 - usenix.org
Mixed Boolean-Arithmetic (MBA) obfuscation is a method to perform a semantics-preserving
transformation from a simple expression to a representation that is hard to understand and …

BinDeep: A deep learning approach to binary code similarity detection

D Tian, X Jia, R Ma, S Liu, W Liu, C Hu - Expert Systems with Applications, 2021 - Elsevier
Binary code similarity detection (BCSD) plays an important role in malware analysis and
vulnerability discovery. Existing methods mainly rely on the expert's knowledge for the …