[PDF][PDF] Firmline: a generic pipeline for large-scale analysis of non-linux firmware

A Balgavy, M Muench - … of the Workshop on Binary Analysis …, 2024 - ndss-symposium.org
Embedded devices are a pervasive and at times invisible part of our lives. Due to this
pervasiveness, security vulnerabilities may have severe consequences, particularly …

{SAFER}: Efficient and {Error-Tolerant} Binary Instrumentation

S Priyadarshan, H Nguyen, R Chouhan… - 32nd USENIX Security …, 2023 - usenix.org
Recent advances in binary instrumentation have been focused on performance. By statically
transforming the code to avoid additional runtime operations, systems such as Egalito and …

Ground truth for binary disassembly is not easy

C Pang, T Zhang, R Yu, B Mao, J Xu - 31st USENIX Security Symposium …, 2022 - usenix.org
Modern disassembly tools often rely on empirical evaluations to validate their performance
and discover their limitations, thus promoting long-term evolvement. To support the empirical …

Funprobe: Probing functions from binary code through probabilistic analysis

S Kim, H Kim, SK Cha - Proceedings of the 31st ACM Joint European …, 2023 - dl.acm.org
Current function identification techniques have been mostly focused on a specific set of
binaries compiled for a specific CPU architecture. While recent deep-learning-based …

How'd Security Benefit Reverse Engineers?: The Implication of Intel CET on Function Identification

H Kim, J Lee, S Kim, SI Jung… - 2022 52nd Annual IEEE …, 2022 - ieeexplore.ieee.org
As CPU vendors introduce various hardware-assisted security features, modern compilers
have started to produce binaries containing security-related instructions. Interestingly, such …

[PDF][PDF] Let Me Unwind That For You: Exceptions to Backward-Edge Protection.

V Duta, F Freyer, F Pagani, M Muench, C Giuffrida - NDSS, 2023 - download.vusec.net
Backward-edge control-flow hijacking via stack buffer overflow is the holy grail of software
exploitation. The ability to directly control critical stack data and the hijacked target makes …

OCFI: Make Function Entry Identification Hard Again

C Pang, T Zhang, X Xu, L Wang, B Mao - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Function entry identification is a crucial yet challenging task for binary disassemblers that
has been the focus of research in the past decades. However, recent researches show that …

Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata

S Priyadarshan, H Nguyen, R Sekar - Proceedings of the 28th ACM …, 2023 - dl.acm.org
Accurate disassembly of stripped binaries is the first step in binary analysis, instrumentation
and reverse engineering. Complex instruction sets such as the x86 pose major challenges …

A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection

M Yoda, S Nakamura, Y Sei, Y Tahara… - … on Internet of Things …, 2023 - ieeexplore.ieee.org
Cyberattacks targeting vulnerabilities in the in-ternet of things (IoT) devices are increasing in
number an-nually. Accordingly, various methods and analysis tools for IoT vulnerability …

Evaluating, Improving and Applying Modern Binary Analysis for Security

R Yu - 2024 - search.proquest.com
Software programs are ubiquitous, connecting our physical world with the digital world.
However, the proliferation of software applications has been accompanied by a surge in …