Bingo: Cross-architecture cross-os binary search

M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho… - Proceedings of the …, 2016 - dl.acm.org
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …

An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries

D Andriesse, X Chen, V Van Der Veen… - 25th USENIX security …, 2016 - usenix.org
It is well-known that static disassembly is an unsolved problem, but how much of a problem
is it in real software—for instance, for binary protection schemes? This work studies the …

[PDF][PDF] Ramblr: Making Reassembly Great Again.

R Wang, Y Shoshitaishvili, A Bianchi, A Machiry… - NDSS, 2017 - sefcom.asu.edu
Static binary rewriting has many important applications in reverse engineering, such as
patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for …

Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask

C Pang, R Yu, Y Chen, E Koskinen… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …

PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace

Y Gu, Q Zhao, Y Zhang, Z Lin - Proceedings of the Seventh ACM on …, 2017 - dl.acm.org
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …

Finding cracks in shields: On the security of control flow integrity mechanisms

Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …

Probabilistic disassembly

K Miller, Y Kwon, Y Sun, Z Zhang… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Disassembling stripped binaries is a prominent challenge for binary analysis, due to the
interleaving of code segments and data, and the difficulties of resolving control transfer …

Accurate and scalable cross-architecture cross-os binary code search with emulation

Y Xue, Z Xu, M Chandramohan… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Different from source code clone detection, clone detection (similar code search) in binary
executables faces big challenges due to the gigantic differences in the syntax and the …

FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking

AJ Gaidis, J Moreira, K Sun, A Milburn… - Proceedings of the 26th …, 2023 - dl.acm.org
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …

Recfa: Resilient control-flow attestation

Y Zhang, X Liu, C Sun, D Zeng, G Tan, X Kan… - Proceedings of the 37th …, 2021 - dl.acm.org
Recent IoT applications gradually adapt more complicated end systems with commodity
software. Ensuring the runtime integrity of these software is a challenging task for the remote …