A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Neural network-based graph embedding for cross-platform binary code similarity detection

X Xu, C Liu, Q Feng, H Yin, L Song… - Proceedings of the 2017 …, 2017 - dl.acm.org
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

{teEther}: Gnawing at ethereum to automatically exploit smart contracts

J Krupp, C Rossow - … USENIX security symposium (USENIX Security 18), 2018 - usenix.org
Cryptocurrencies like Bitcoin not only provide a decentralized currency, but also provide a
programmatic way to process transactions. Ethereum, the second largest cryptocurrency …

Autoattacker: A large language model guided system to implement automatic cyber-attacks

J Xu, JW Stokes, G McDonald, X Bai, D Marshall… - arxiv preprint arxiv …, 2024 - arxiv.org
Large language models (LLMs) have demonstrated impressive results on natural language
tasks, and security researchers are beginning to employ them in both offensive and …

Deepbindiff: Learning program-wide code representations for binary diffing

Y Duan, X Li, J Wang, H Yin - 2020 - ink.library.smu.edu.sg
Binary diffing analysis quantitatively measures the differences between two given binaries
and produces fine-grained basic block matching. It has been widely used to enable different …

Scalable graph-based bug search for firmware images

Q Feng, R Zhou, C Xu, Y Cheng, B Testa… - Proceedings of the 2016 …, 2016 - dl.acm.org
Because of rampant security breaches in IoT devices, searching vulnerabilities in massive
IoT ecosystems is more crucial than ever. Recent studies have demonstrated that control …

Modeling and discovering vulnerabilities with code property graphs

F Yamaguchi, N Golde, D Arp… - 2014 IEEE symposium on …, 2014 - ieeexplore.ieee.org
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …

Toward verified artificial intelligence

SA Seshia, D Sadigh, SS Sastry - Communications of the ACM, 2022 - dl.acm.org
Toward verified artificial intelligence Page 1 46 COMMUNICATIONS OF THE ACM | JULY
2022 | VOL. 65 | NO. 7 contributed articles ILL US TRA TION B Y PETER CRO W THER A …