Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019 - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

Binary-code obfuscations in prevalent packer tools

KA Roundy, BP Miller - ACM Computing Surveys (CSUR), 2013 - dl.acm.org
The first steps in analyzing defensive malware are understanding what obfuscations are
present in real-world malware binaries, how these obfuscations hinder analysis, and how …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

Sok: Sgx. fail: How stuff gets exposed

S Van Schaik, A Seto, T Yurek, A Batori… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Intel's Software Guard Extensions (SGX) promises an isolated execution environment,
protected from all software running on the machine. As such, numerous works have sought …

{AddressSanitizer}: A fast address sanity checker

K Serebryany, D Bruening, A Potapenko… - 2012 USENIX annual …, 2012 - usenix.org
AddressSanitizer: A Fast Address Sanity Checker Page 1 AddressSanitizer: A Fast Address
Sanity Checker Konstantin Serebryany, Derek Bruening, Alexander Potapenko, Dmitry …

[PDF][PDF] What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices.

M Muench, J Stijohann, F Kargl, A Francillon… - NDSS, 2018 - wcventure.github.io
As networked embedded systems are becoming more ubiquitous, their security is becoming
critical to our daily life. While manual or automated large scale analysis of those systems …

Control flow and code integrity for COTS binaries: An effective defense against real-world ROP attacks

M Zhang, R Sekar - Proceedings of the 31st Annual Computer Security …, 2015 - dl.acm.org
Despite decades of sustained effort, memory corruption attacks continue to be one of the
most serious security threats faced today. They are highly sought after by attackers, as they …

Retrowrite: Statically instrumenting cots binaries for fuzzing and sanitization

S Dinesh, N Burow, D Xu… - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Analyzing the security of closed source binaries is currently impractical for end-users, or
even developers who rely on third-party libraries. Such analysis relies on automatic …

Pin: building customized program analysis tools with dynamic instrumentation

CK Luk, R Cohn, R Muth, H Patil, A Klauser… - Acm sigplan …, 2005 - dl.acm.org
Robust and powerful software instrumentation tools are essential for program analysis tasks
such as profiling, performance evaluation, and bug detection. To meet this need, we have …

Valgrind: a framework for heavyweight dynamic binary instrumentation

N Nethercote, J Seward - ACM Sigplan notices, 2007 - dl.acm.org
Dynamic binary instrumentation (DBI) frameworks make it easy to build dynamic binary
analysis (DBA) tools such as checkers and profilers. Much of the focus on DBI frameworks …