Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …

Studying and understanding the tradeoffs between generality and reduction in software debloating

Q Xin, Q Zhang, A Orso - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Existing approaches for program debloating often use a usage profile, typically provided as
a set of inputs, for identifying the features of a program to be preserved. Specifically, given a …

{AnimateDead}: Debloating web applications using concolic execution

BA Azad, R Jahanshahi, C Tsoukaladelis… - 32nd USENIX Security …, 2023 - usenix.org
Year over year, modern web applications evolve to cater to the needs of many users and
support various runtime environments. The ever-growing need to appeal to as many users …

One size does not fit all: security hardening of mips embedded systems via static binary debloating for shared libraries

H Zhang, M Ren, Y Lei, J Ming - Proceedings of the 27th ACM …, 2022 - dl.acm.org
Embedded systems have become prominent targets for cyberattacks. To exploit firmware's
memory corruption vulnerabilities, cybercriminals harvest reusable code gadgets from the …

C to Checked C by 3C

A Machiry, J Kastner, M McCutchen, A Eline… - Proceedings of the …, 2022 - dl.acm.org
Owing to the continued use of C (and C++), spatial safety violations (eg, buffer overflows)
still constitute one of today's most dangerous and prevalent security vulnerabilities. To …

A Broad Comparative Evaluation of Software Debloating Tools

MD Brown, A Meily, B Fairservice, A Sood… - 33rd USENIX Security …, 2024 - usenix.org
Software debloating tools seek to improve program security and performance by removing
unnecessary code, called bloat. While many techniques have been proposed, several …

Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images

E Gustafson, P Grosen, N Redini, S Jha… - Proceedings of the 26th …, 2023 - dl.acm.org
In today's era of the Internet of Things, we are surrounded by security-and safety-critical,
network-connected devices. In parallel with the rise in attacks on such devices, we have also …

Minimalist: Semi-automated Debloating of {PHP} Web Applications through Static Analysis

R Jahanshahi, BA Azad, N Nikiforakis… - 32nd USENIX Security …, 2023 - usenix.org
As web applications grow more complicated and rely on third-party libraries to deliver new
features to their users, they become bloated with unnecessary code. This unnecessary code …

Palantír: Optimizing attack provenance with hardware-enhanced system observability

J Zeng, C Zhang, Z Liang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
System auditing is the foundation of attack provenance to investigate root causes and
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …

Saffire: Context-sensitive function specialization against code reuse attacks

S Mishra, M Polychronakis - 2020 IEEE European Symposium …, 2020 - ieeexplore.ieee.org
The sophistication and complexity of recent exploitation techniques, which rely on memory
disclosure and whole-function reuse to bypass address space layout randomization and …