[PDF][PDF] Firmline: a generic pipeline for large-scale analysis of non-linux firmware
A Balgavy, M Muench - … of the Workshop on Binary Analysis …, 2024 - ndss-symposium.org
Embedded devices are a pervasive and at times invisible part of our lives. Due to this
pervasiveness, security vulnerabilities may have severe consequences, particularly …
pervasiveness, security vulnerabilities may have severe consequences, particularly …
{SAFER}: Efficient and {Error-Tolerant} Binary Instrumentation
Recent advances in binary instrumentation have been focused on performance. By statically
transforming the code to avoid additional runtime operations, systems such as Egalito and …
transforming the code to avoid additional runtime operations, systems such as Egalito and …
Ground truth for binary disassembly is not easy
Modern disassembly tools often rely on empirical evaluations to validate their performance
and discover their limitations, thus promoting long-term evolvement. To support the empirical …
and discover their limitations, thus promoting long-term evolvement. To support the empirical …
Funprobe: Probing functions from binary code through probabilistic analysis
Current function identification techniques have been mostly focused on a specific set of
binaries compiled for a specific CPU architecture. While recent deep-learning-based …
binaries compiled for a specific CPU architecture. While recent deep-learning-based …
How'd Security Benefit Reverse Engineers?: The Implication of Intel CET on Function Identification
As CPU vendors introduce various hardware-assisted security features, modern compilers
have started to produce binaries containing security-related instructions. Interestingly, such …
have started to produce binaries containing security-related instructions. Interestingly, such …
[PDF][PDF] Let Me Unwind That For You: Exceptions to Backward-Edge Protection.
Backward-edge control-flow hijacking via stack buffer overflow is the holy grail of software
exploitation. The ability to directly control critical stack data and the hijacked target makes …
exploitation. The ability to directly control critical stack data and the hijacked target makes …
OCFI: Make Function Entry Identification Hard Again
C Pang, T Zhang, X Xu, L Wang, B Mao - Proceedings of the 32nd ACM …, 2023 - dl.acm.org
Function entry identification is a crucial yet challenging task for binary disassemblers that
has been the focus of research in the past decades. However, recent researches show that …
has been the focus of research in the past decades. However, recent researches show that …
Accurate Disassembly of Complex Binaries Without Use of Compiler Metadata
Accurate disassembly of stripped binaries is the first step in binary analysis, instrumentation
and reverse engineering. Complex instruction sets such as the x86 pose major challenges …
and reverse engineering. Complex instruction sets such as the x86 pose major challenges …
A Middleware to Improve Analysis Coverage in IoT Vulnerability Detection
Cyberattacks targeting vulnerabilities in the in-ternet of things (IoT) devices are increasing in
number an-nually. Accordingly, various methods and analysis tools for IoT vulnerability …
number an-nually. Accordingly, various methods and analysis tools for IoT vulnerability …
Evaluating, Improving and Applying Modern Binary Analysis for Security
R Yu - 2024 - search.proquest.com
Software programs are ubiquitous, connecting our physical world with the digital world.
However, the proliferation of software applications has been accompanied by a surge in …
However, the proliferation of software applications has been accompanied by a surge in …