Malware classification and composition analysis: A survey of recent developments

A Abusitta, MQ Li, BCM Fung - Journal of Information Security and …, 2021 - Elsevier
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

[PDF][PDF] Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.

Y Shoshitaishvili, R Wang, C Hauser, C Kruegel… - NDSS, 2015 - ndss-symposium.org
Embedded devices have become ubiquitous, and they are used in a range of privacy-
sensitive and security-critical applications. Most of these devices run proprietary software …

[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.

S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Recognizing functions in binaries with neural networks

ECR Shin, D Song, R Moazzezi - 24th USENIX security symposium …, 2015 - usenix.org
Binary analysis facilitates many important applications like malware detection and
automatically fixing vulnerable software. In this paper, we propose to apply artificial neural …

Occlum: Secure and efficient multitasking inside a single enclave of intel sgx

Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …

Droidchameleon: evaluating android anti-malware against transformation attacks

V Rastogi, Y Chen, X Jiang - Proceedings of the 8th ACM SIGSAC …, 2013 - dl.acm.org
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …

ROPecker: A generic and practical approach for defending against ROP attack

Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng - 2014 - ink.library.smu.edu.sg
Abstract Return-Oriented Programming (ROP) is a sophisticated exploitation technique that
is able to drive target applications to perform arbitrary unintended operations by constructing …