Malware classification and composition analysis: A survey of recent developments
Malware detection and classification are becoming more and more challenging, given the
complexity of malware design and the recent advancement of communication and …
complexity of malware design and the recent advancement of communication and …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Sok:(state of) the art of war: Offensive techniques in binary analysis
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …
level, semantically rich information about data structures and control constructs makes the …
[PDF][PDF] Firmalice-automatic detection of authentication bypass vulnerabilities in binary firmware.
Embedded devices have become ubiquitous, and they are used in a range of privacy-
sensitive and security-critical applications. Most of these devices run proprietary software …
sensitive and security-critical applications. Most of these devices run proprietary software …
[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.
S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …
Being able to perform this process at the binary level is very important given that many …
Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …
even developers who rely on third-party libraries. Such analysis relies on automatic …
Recognizing functions in binaries with neural networks
Binary analysis facilitates many important applications like malware detection and
automatically fixing vulnerable software. In this paper, we propose to apply artificial neural …
automatically fixing vulnerable software. In this paper, we propose to apply artificial neural …
Occlum: Secure and efficient multitasking inside a single enclave of intel sgx
Y Shen, H Tian, Y Chen, K Chen, R Wang… - Proceedings of the …, 2020 - dl.acm.org
Intel Software Guard Extensions (SGX) enables user-level code to create private memory
regions called enclaves, whose code and data are protected by the CPU from software and …
regions called enclaves, whose code and data are protected by the CPU from software and …
Droidchameleon: evaluating android anti-malware against transformation attacks
Mobile malware threats have recently become a real concern. In this paper, we evaluate the
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
state-of-the-art commercial mobile antimalware products for Android and test how resistant …
ROPecker: A generic and practical approach for defending against ROP attack
Abstract Return-Oriented Programming (ROP) is a sophisticated exploitation technique that
is able to drive target applications to perform arbitrary unintended operations by constructing …
is able to drive target applications to perform arbitrary unintended operations by constructing …