Binclone: Detecting code clones in malware
MR Farhadi, BCM Fung, P Charland… - … on Software Security …, 2014 - ieeexplore.ieee.org
To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to
disassemble the malware, analyze the resulting assembly code, and then archive the …
disassemble the malware, analyze the resulting assembly code, and then archive the …
The malsource dataset: Quantifying complexity and code reuse in malware development
A Calleja, J Tapiador… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
During the last decades, the problem of malicious and unwanted software (malware) has
surged in numbers and sophistication. Malware plays a key role in most of today's …
surged in numbers and sophistication. Malware plays a key role in most of today's …
[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …
vulnerable software components. However, our survey of the literature shows that most …
Expose: Discovering potential binary code re-use
BH Ng, A Prakash - 2013 IEEE 37th Annual Computer Software …, 2013 - ieeexplore.ieee.org
The use of third-party libraries in deployed applications can potentially put an organization's
intellectual property at risk due to licensing restrictions requiring disclosure or distribution of …
intellectual property at risk due to licensing restrictions requiring disclosure or distribution of …
Variant: a malware similarity testing framework
J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of
malware families through similarity testing. The framework is a series of tests and data …
malware families through similarity testing. The framework is a series of tests and data …
Scalable code clone search for malware analysis
MR Farhadi, BCM Fung, YB Fung, P Charland… - Digital …, 2015 - Elsevier
Reverse engineering is the primary step to analyze a piece of malware. After having
disassembled a malware binary, a reverse engineer needs to spend extensive effort …
disassembled a malware binary, a reverse engineer needs to spend extensive effort …
Malware provenance: code reuse detection in malicious software at scale
J Upchurch, X Zhou - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
Detecting code reuse in software has applications in malicious code analysis and in
malware code search and retrieval, but is complicated by the lack of available source code …
malware code search and retrieval, but is complicated by the lack of available source code …
Binary analysis overview
When the source code is unavailable, it is important for security applications, such as
malware detection, software license infringement, vulnerability analysis, and digital forensics …
malware detection, software license infringement, vulnerability analysis, and digital forensics …
Large-scale malware analysis, detection, and signature generation
X Hu - 2011 - search.proquest.com
As the primary vehicle for most organized cybercrimes, malicious software (or malware) has
become one of the most serious threats to computer systems and the Internet. With the …
become one of the most serious threats to computer systems and the Internet. With the …
Heuristic malware detection via basic block comparison
F Adkins, L Jones, M Carlisle… - 2013 8th International …, 2013 - ieeexplore.ieee.org
Each day, malware analysts are tasked with more samples than they have the ability to
analyze by hand. To produce this trend, malware authors often reuse a significant portion of …
analyze by hand. To produce this trend, malware authors often reuse a significant portion of …