From hack to elaborate technique—a survey on binary rewriting

M Wenzl, G Merzdovnik, J Ullrich… - ACM Computing Surveys …, 2019 - dl.acm.org
Binary rewriting is changing the semantics of a program without having the source code at
hand. It is used for diverse purposes, such as emulation (eg, QEMU), optimization (eg …

A tough call: Mitigating advanced code-reuse attacks at the binary level

V Van Der Veen, E Göktas, M Contag… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Current binary-level Control-Flow Integrity (CFI) techniques are weak in determining the set
of valid targets for indirect control flow transfers on the forward edge. In particular, the lack of …

libmpk: Software abstraction for intel memory protection keys (intel {MPK})

S Park, S Lee, W Xu, H Moon, T Kim - 2019 USENIX Annual Technical …, 2019 - usenix.org
Intel Memory Protection Keys (MPK) is a new hardware primitive to support thread-local
permission control on groups of pages without requiring modification of page tables …

An {In-Depth} Analysis of Disassembly on {Full-Scale} x86/x64 Binaries

D Andriesse, X Chen, V Van Der Veen… - 25th USENIX security …, 2016 - usenix.org
It is well-known that static disassembly is an unsolved problem, but how much of a problem
is it in real software—for instance, for binary protection schemes? This work studies the …

HDFI: Hardware-assisted data-flow isolation

C Song, H Moon, M Alam, I Yun, B Lee… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing
defense mechanisms are inadequate; in general, the software-based approaches are not …

StateFormer: fine-grained type recovery from binaries using generative state modeling

K Pei, J Guan, M Broughton, Z Chen, S Yao… - Proceedings of the 29th …, 2021 - dl.acm.org
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …

Compiler-agnostic function detection in binaries

D Andriesse, A Slowinska, H Bos - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
We propose Nucleus, a novel function detection algorithm for binaries. In contrast to prior
work, Nucleus is compiler-agnostic, and does not require any learning phase or signature …

HCFI: Hardware-enforced control-flow integrity

N Christoulakis, G Christou, E Athanasopoulos… - Proceedings of the …, 2016 - dl.acm.org
Control-flow hijacking is the principal method for code-reuse techniques like Return-oriented
Programming (ROP) and Jump-oriented Programming (JOP). For defending against such …

[PDF][PDF] Protecting C++ Dynamic Dispatch Through VTable Interleaving.

D Bounov, RG Kici, S Lerner - NDSS, 2016 - cseweb.ucsd.edu
With new defenses against traditional control-flow attacks like stack buffer overflows,
attackers are increasingly using more advanced mechanisms to take control of execution …

Finding cracks in shields: On the security of control flow integrity mechanisms

Y Li, M Wang, C Zhang, X Chen, S Yang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Control-flow integrity (CFI) is a promising technique to mitigate control-flow hijacking attacks.
In the past decade, dozens of CFI mechanisms have been proposed by researchers …