Adversarial exemples: A survey and experimental evaluation of practical attacks on machine learning for windows malware detection
Recent work has shown that adversarial Windows malware samples—referred to as
adversarial EXE mples in this article—can bypass machine learning-based detection relying …
adversarial EXE mples in this article—can bypass machine learning-based detection relying …
Functionality-preserving black-box optimization of adversarial windows malware
Windows malware detectors based on machine learning are vulnerable to adversarial
examples, even if the attacker is only given black-box query access to the model. The main …
examples, even if the attacker is only given black-box query access to the model. The main …
Sok: All you ever wanted to know about x86/x64 binary disassembly but were afraid to ask
Disassembly of binary code is hard, but necessary for improving the security of binary
software. Over the past few decades, research in binary disassembly has produced many …
software. Over the past few decades, research in binary disassembly has produced many …
Binary rewriting without control flow recovery
Static binary rewriting has many important applications in software security and systems,
such as hardening, repair, patching, instrumentation, and debugging. While many different …
such as hardening, repair, patching, instrumentation, and debugging. While many different …
Adversarial Binaries: AI-guided Instrumentation Methods for Malware Detection Evasion
Adversarial binaries are executable files that have been altered without loss of function by
an AI agent in order to deceive malware detection systems. Progress in this emergent vein of …
an AI agent in order to deceive malware detection systems. Progress in this emergent vein of …
Same coverage, less bloat: Accelerating binary-only fuzzing with coverage-preserving coverage-guided tracing
Coverage-guided fuzzing's aggressive, high-volume testing has helped reveal tens of
thousands of software security flaws. While executing billions of test cases mandates fast …
thousands of software security flaws. While executing billions of test cases mandates fast …
Flexible non-intrusive dynamic instrumentation for webassembly
BL Titzer, E Gilbert, BWJ Teo, Y Anand… - Proceedings of the 29th …, 2024 - dl.acm.org
A key strength of managed runtimes over hardware is the ability to gain detailed insight into
the dynamic execution of programs with instrumentation. Analyses such as code coverage …
the dynamic execution of programs with instrumentation. Analyses such as code coverage …
Improving performance and energy consumption in embedded systems via binary acceleration: A survey
The breakdown of Dennard scaling has resulted in a decade-long stall of the maximum
operating clock frequencies of processors. To mitigate this issue, computing shifted to multi …
operating clock frequencies of processors. To mitigate this issue, computing shifted to multi …
{ARMore}: Pushing Love Back Into Binaries
L Di Bartolomeo, H Moghaddas, M Payer - 32nd USENIX Security …, 2023 - usenix.org
Static rewriting enables late-state code changes (eg, to add mitigations, to remove
unnecessary code, or to instrument for code coverage) at low overhead in security-critical …
unnecessary code, or to instrument for code coverage) at low overhead in security-critical …
Avoiding instruction-centric microarchitectural timing channels via binary-code transformations
With the end of Moore's Law-based scaling, novel microarchitectural optimizations are being
patented, researched, and implemented at an increasing rate. Previous research has …
patented, researched, and implemented at an increasing rate. Previous research has …