Bingo: Cross-architecture cross-os binary search
Binary code search has received much attention recently due to its impactful applications,
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
eg, plagiarism detection, malware detection and software vulnerability auditing. However …
An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries
D Andriesse, X Chen, V Van Der Veen… - 25th USENIX security …, 2016 - usenix.org
It is well-known that static disassembly is an unsolved problem, but how much of a problem
is it in real software—for instance, for binary protection schemes? This work studies the …
is it in real software—for instance, for binary protection schemes? This work studies the …
[PDF][PDF] Ramblr: Making Reassembly Great Again.
Static binary rewriting has many important applications in reverse engineering, such as
patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for …
patching, code reuse, and instrumentation. Binary reassembling is an efficient solution for …
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace
This paper presents PT-CFI, a new backward-edge control flow violation detection system
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
based on a novel use of a recently introduced hardware feature called Intel Processor Trace …
Finding cracks in shields: On the security of control flow integrity mechanisms
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …
In the past decade, dozens of CFI mechanisms have been proposed by researchers …
Probabilistic disassembly
Disassembling stripped binaries is a prominent challenge for binary analysis, due to the
interleaving of code segments and data, and the difficulties of resolving control transfer …
interleaving of code segments and data, and the difficulties of resolving control transfer …
Accurate and scalable cross-architecture cross-os binary code search with emulation
Different from source code clone detection, clone detection (similar code search) in binary
executables faces big challenges due to the gigantic differences in the syntax and the …
executables faces big challenges due to the gigantic differences in the syntax and the …
FineIBT: Fine-grain Control-flow Enforcement with Indirect Branch Tracking
We present the design, implementation, and evaluation of FineIBT: a CFI enforcement
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
mechanism that improves the precision of hardware-assisted CFI solutions, like Intel IBT, by …
Recfa: Resilient control-flow attestation
Recent IoT applications gradually adapt more complicated end systems with commodity
software. Ensuring the runtime integrity of these software is a challenging task for the remote …
software. Ensuring the runtime integrity of these software is a challenging task for the remote …