Refining decompiled c code with large language models

WK Wong, H Wang, Z Li, Z Liu, S Wang, Q Tang… - arxiv preprint arxiv …, 2023‏ - arxiv.org
AC decompiler converts an executable into source code. The recovered C source code,
once re-compiled, is expected to produce an executable with the same functionality as the …

Plankton: Reconciling binary code and debug information

A Zhou, C Ye, H Huang, Y Cai, C Zhang - Proceedings of the 29th ACM …, 2024‏ - dl.acm.org
Static analysis has been widely used in large-scale software defect detection. Despite recent
advances, it is still not practical enough because it requires compilation interference to …

The Convergence of Source Code and Binary Vulnerability Discovery--A Case Study

A Mantovani, L Compagna, Y Shoshitaishvili… - Proceedings of the …, 2022‏ - dl.acm.org
Decompilers are tools designed to recover a high-level language representation (typically in
C code) from program binaries. Over the past five years, decompilers have improved …

What you trace is what you get: dynamic stack-layout recovery for binary recompilation

F Parzefall, C Deshpande, F Hetzelt… - Proceedings of the 29th …, 2024‏ - dl.acm.org
Users of proprietary and/or legacy programs without vendor support are denied the
significant advances in compiler technologies of the past decades. Adapting these …

A semantics-based approach on binary function similarity detection

Y Zhang, B Fang, Z **ong, Y Wang… - IEEE Internet of …, 2024‏ - ieeexplore.ieee.org
As a fundamental component of Internet of Things (IoT) devices, firmware plays an essential
role. Nowadays, the development of IoT firmware relies extensively on third-party …

Polynima: Practical hybrid recompilation for multithreaded binaries

C Deshpande, F Parzefall, F Hetzelt… - Proceedings of the …, 2024‏ - dl.acm.org
The maintenance of software distributed in its binary form can become challenging over
time, due to the lack of vendor support or obsolete build environments. This can be costly …

Linux IoT Malware Variant Classification Using Binary Lifting and Opcode Entropy

J Ramamoorthy, K Gupta, NK Shashidhar, C Varol - Electronics, 2024‏ - mdpi.com
Binary function analysis is fundamental in understanding the behavior and genealogy of
malware. The detection, classification, and analysis of Linux IoT malware and its variants …

Evmbt: A binary translation scheme for upgrading evm smart contracts to wasm

W Chen, X Luo, H Wang, H Cui, S Zheng… - Proceedings of the 25th …, 2024‏ - dl.acm.org
Ethereum is the first and largest blockchain that supports smart contracts. To enhance
scalability and security, one major planned change of Ethereum 2.0 (Eth2) is to upgrade the …

Forward-mode automatic differentiation of compiled programs

M Aehle, J Blühdorn, M Sagebaum… - ACM Transactions on …, 2022‏ - dl.acm.org
Algorithmic differentiation (AD) is a set of techniques that provide partial derivatives of
computer-implemented functions. Such functions can be supplied to state-of-the-art AD tools …

LiftFuzz: Validating Binary Lifters through Context-aware Fuzzing with GPT

Y Zhou, F Yang, Z Song, K Zhang, J Chen… - Proceedings of the 2024 …, 2024‏ - dl.acm.org
Analyzing binary code is vital for software engineering and security research, particularly
when the source code is unavailable. However, understanding, modifying, and retargeting …