Binclone: Detecting code clones in malware

MR Farhadi, BCM Fung, P Charland… - … on Software Security …, 2014 - ieeexplore.ieee.org
To gain an in-depth understanding of the behaviour of a malware, reverse engineers have to
disassemble the malware, analyze the resulting assembly code, and then archive the …

The malsource dataset: Quantifying complexity and code reuse in malware development

A Calleja, J Tapiador… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
During the last decades, the problem of malicious and unwanted software (malware) has
surged in numbers and sophistication. Malware plays a key role in most of today's …

[HTML][HTML] BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs)

S Alrabaee, L Wang, M Debbabi - Digital Investigation, 2016 - Elsevier
Binary analysis is useful in many practical applications, such as the detection of malware or
vulnerable software components. However, our survey of the literature shows that most …

Expose: Discovering potential binary code re-use

BH Ng, A Prakash - 2013 IEEE 37th Annual Computer Software …, 2013 - ieeexplore.ieee.org
The use of third-party libraries in deployed applications can potentially put an organization's
intellectual property at risk due to licensing restrictions requiring disclosure or distribution of …

Variant: a malware similarity testing framework

J Upchurch, X Zhou - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper describes Variant, a testing framework for projects attempting to locate variants of
malware families through similarity testing. The framework is a series of tests and data …

Scalable code clone search for malware analysis

MR Farhadi, BCM Fung, YB Fung, P Charland… - Digital …, 2015 - Elsevier
Reverse engineering is the primary step to analyze a piece of malware. After having
disassembled a malware binary, a reverse engineer needs to spend extensive effort …

Malware provenance: code reuse detection in malicious software at scale

J Upchurch, X Zhou - 2016 11th International Conference on …, 2016 - ieeexplore.ieee.org
Detecting code reuse in software has applications in malicious code analysis and in
malware code search and retrieval, but is complicated by the lack of available source code …

Binary analysis overview

S Alrabaee, M Debbabi, P Shirani, L Wang… - … Code Fingerprinting for …, 2020 - Springer
When the source code is unavailable, it is important for security applications, such as
malware detection, software license infringement, vulnerability analysis, and digital forensics …

Large-scale malware analysis, detection, and signature generation

X Hu - 2011 - search.proquest.com
As the primary vehicle for most organized cybercrimes, malicious software (or malware) has
become one of the most serious threats to computer systems and the Internet. With the …

Heuristic malware detection via basic block comparison

F Adkins, L Jones, M Carlisle… - 2013 8th International …, 2013 - ieeexplore.ieee.org
Each day, malware analysts are tasked with more samples than they have the ability to
analyze by hand. To produce this trend, malware authors often reuse a significant portion of …